sport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 592.432109][ T9882] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 593.525239][ T9877] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 593.567598][ T9890] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 593.582081][ T9890] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 593.692083][ T9890] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 594.106071][ T9877] team0: Port device team_slave_0 added
[ 594.133683][ T9890] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 594.140636][ T9890] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 594.243327][ T9890] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 594.654342][ T9877] team0: Port device team_slave_1 added
[ 596.389819][ T9877] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 596.400336][ T9877] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 596.447738][ T9877] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 596.782283][ T3560] Bluetooth: hci2: command 0x0409 tx timeout
[ 596.876269][ T9882] device hsr_slave_0 entered promiscuous mode
[ 597.002613][ T9882] device hsr_slave_1 entered promiscuous mode
[ 597.103554][ T9882] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 597.111130][ T9882] Cannot create hsr debugfs directory
[ 597.138464][ T9877] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 597.153924][ T9877] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 597.224898][ T9877] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 598.071757][ T9890] device hsr_slave_0 entered promiscuous mode
[ 598.192600][ T9890] device hsr_slave_1 entered promiscuous mode
[ 598.345637][ T9890] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 598.362088][ T9890] Cannot create hsr debugfs directory
[ 598.491521][ T9877] device hsr_slave_0 entered promiscuous mode
[ 598.551568][ T9877] device hsr_slave_1 entered promiscuous mode
[ 598.643576][ T9877] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 598.653895][ T9877] Cannot create hsr debugfs directory
[ 598.852409][ T6590] Bluetooth: hci2: command 0x041b tx timeout
[ 599.617307][ T9885] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 600.274088][ T9885] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 600.932290][ T3518] Bluetooth: hci2: command 0x040f tx timeout
[ 601.448565][ T9885] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 602.058658][ T9885] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 602.242313][ T9923] chnl_net:caif_netlink_parms(): no params data found
[ 603.012376][ T3518] Bluetooth: hci2: command 0x0419 tx timeout
[ 603.040937][ T9882] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 603.484716][ T9923] bridge0: port 1(bridge_slave_0) entered blocking state
[ 603.491789][ T9923] bridge0: port 1(bridge_slave_0) entered disabled state
[ 603.533375][ T9923] device bridge_slave_0 entered promiscuous mode
[ 603.752895][ T9882] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 603.855515][ T9923] bridge0: port 2(bridge_slave_1) entered blocking state
[ 603.882243][ T9923] bridge0: port 2(bridge_slave_1) entered disabled state
[ 603.890428][ T9923] device bridge_slave_1 entered promiscuous mode
[ 604.125990][ T9923] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 604.555108][ T9882] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 604.664955][ T9923] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 605.193449][ T9882] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 605.297076][ T9923] team0: Port device team_slave_0 added
[ 605.316467][ T9923] team0: Port device team_slave_1 added
[ 605.594169][ T9923] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 605.622287][ T9923] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 605.708862][ T9923] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 605.753511][ T9923] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 605.760472][ T9923] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 605.830511][ T9923] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 606.032017][ T9923] device hsr_slave_0 entered promiscuous mode
[ 606.102518][ T9923] device hsr_slave_1 entered promiscuous mode
[ 606.139578][ T9923] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 606.152089][ T9923] Cannot create hsr debugfs directory
[ 606.195421][ T9890] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 606.610927][ T9890] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 606.893107][ T9890] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 607.153870][ T4115] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 607.209165][ T9890] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 607.263688][ T4115] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 607.365063][ T4115] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 607.462893][ T4115] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 607.691575][ T4115] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 607.792775][ T4115] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 607.878260][ T4115] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 607.973897][ T4115] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 608.327843][ T9890] netdevsim netdevsim1 netdevsim0: renamed from eth0
[ 608.361699][ T9890] netdevsim netdevsim1 netdevsim1: renamed from eth1
[ 608.428366][ T9890] netdevsim netdevsim1 netdevsim2: renamed from eth2
[ 608.463773][ T9890] netdevsim netdevsim1 netdevsim3: renamed from eth3
[ 608.685795][ T9890] 8021q: adding VLAN 0 to HW filter on device bond0
[ 608.740409][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 608.749471][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 608.778245][ T9890] 8021q: adding VLAN 0 to HW filter on device team0
[ 609.043894][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 609.055482][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 609.072473][ T13] bridge0: port 1(bridge_slave_0) entered blocking state
[ 609.079537][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 609.105821][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 609.122629][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 609.131007][ T13] bridge0: port 2(bridge_slave_1) entered blocking state
[ 609.138096][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 609.158815][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 609.214073][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 609.224466][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 609.233560][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 609.243673][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 609.252386][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 609.253075][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 609.269438][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 609.278658][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 609.290888][ T9890] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 609.304521][ T9890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 609.321266][ T9885] netdevsim netdevsim4 netdevsim0: renamed from eth0
[ 609.334122][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 609.343358][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 609.351871][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 609.364437][ T9885] netdevsim netdevsim4 netdevsim1: renamed from eth1
[ 609.380855][ T9885] netdevsim netdevsim4 netdevsim2: renamed from eth2
[ 609.421382][ T9885] netdevsim netdevsim4 netdevsim3: renamed from eth3
[ 609.493672][ T9882] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 609.544337][ T9882] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 609.562256][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 609.569724][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 609.595138][ T9882] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 609.609618][ T9890] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 609.632233][ T9882] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 609.780602][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 609.796663][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 609.882223][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 609.890438][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 609.899721][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 609.907735][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 609.951750][ T9890] device veth0_vlan entered promiscuous mode
[ 610.015956][ T9885] 8021q: adding VLAN 0 to HW filter on device bond0
[ 610.026886][ T9890] device veth1_vlan entered promiscuous mode
[ 610.069413][ T9885] 8021q: adding VLAN 0 to HW filter on device team0
[ 610.087919][ T9882] 8021q: adding VLAN 0 to HW filter on device bond0
[ 610.097446][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 610.105914][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 610.116225][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 610.124256][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 610.153509][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 610.181446][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 610.190442][ T3532] bridge0: port 1(bridge_slave_0) entered blocking state
[ 610.197502][ T3532] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 610.206028][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 610.215242][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 610.223865][ T3532] bridge0: port 2(bridge_slave_1) entered blocking state
[ 610.230913][ T3532] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 610.238564][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 610.247409][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 610.256181][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 610.263997][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 610.271972][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 610.281629][ T9882] 8021q: adding VLAN 0 to HW filter on device team0
[ 610.301192][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 610.313839][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 610.365498][ T9890] device veth0_macvtap entered promiscuous mode
[ 610.373915][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 610.381845][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 610.390758][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 610.399885][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 610.408876][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 610.417585][ T6590] bridge0: port 1(bridge_slave_0) entered blocking state
[ 610.424676][ T6590] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 610.433467][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 610.442007][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 610.450743][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 610.459888][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 610.468697][ T6590] bridge0: port 2(bridge_slave_1) entered blocking state
[ 610.475784][ T6590] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 610.483932][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 610.492415][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 610.500967][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 610.509560][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 610.517975][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 610.563497][ T9885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 610.581909][ T9890] device veth1_macvtap entered promiscuous mode
[ 610.590332][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 610.599038][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 610.607614][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 610.615961][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 610.625020][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 610.636658][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 610.645348][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 610.653909][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 610.662274][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 610.670632][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 610.688118][ T9882] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 610.701255][ T9882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 610.728239][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 610.742028][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 610.750690][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 610.776132][ T9877] netdevsim netdevsim3 netdevsim0: renamed from eth0
[ 610.820013][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 610.843874][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 610.858130][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 610.869249][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 610.892543][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 610.911419][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 610.921904][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 610.933160][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 610.944849][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 610.955607][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 610.967377][ T9890] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 610.985215][ T9877] netdevsim netdevsim3 netdevsim1: renamed from eth1
[ 611.010229][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 611.030149][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 611.055213][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 611.080032][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 611.102412][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 611.122129][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 611.131946][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 611.143640][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 611.154791][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 611.165580][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 611.175858][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 611.189421][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 611.200318][ T9890] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 611.210447][ T9877] netdevsim netdevsim3 netdevsim2: renamed from eth2
[ 611.231412][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 611.239926][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 611.250598][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 611.258616][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 611.273374][ T9890] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 611.283517][ T9890] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 611.293332][ T9890] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 611.302021][ T9890] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 611.311782][ T9877] netdevsim netdevsim3 netdevsim3: renamed from eth3
[ 611.334199][ T9882] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 611.385251][ T9885] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 611.393674][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 611.401158][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 611.447678][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 611.459522][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 611.509094][ T9923] netdevsim netdevsim2 netdevsim0: renamed from eth0
[ 611.553796][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 611.564074][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 611.583602][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 611.602521][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 611.612540][ T9882] device veth0_vlan entered promiscuous mode
[ 611.639851][ T9923] netdevsim netdevsim2 netdevsim1: renamed from eth1
[ 611.655761][ T9923] netdevsim netdevsim2 netdevsim2: renamed from eth2
[ 611.690762][ T9923] netdevsim netdevsim2 netdevsim3: renamed from eth3
[ 611.712545][ T155] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 611.715389][ T9882] device veth1_vlan entered promiscuous mode
[ 611.720510][ T155] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 611.847801][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 611.871957][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 611.880791][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 611.953758][ T144] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 611.961853][ T144] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 611.971418][ T9882] device veth0_macvtap entered promiscuous mode
[ 611.988740][ T9877] 8021q: adding VLAN 0 to HW filter on device bond0
[ 611.997761][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 612.006944][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 612.015928][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 612.024522][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 612.033401][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 612.053098][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 612.061136][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 612.070436][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 612.080237][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 612.088555][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
12:03:42 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 612.098840][ T9882] device veth1_macvtap entered promiscuous mode
12:03:42 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 612.137690][ T9885] device veth0_vlan entered promiscuous mode
12:03:42 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 612.249911][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 612.258392][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 612.282757][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 612.328862][ T9877] 8021q: adding VLAN 0 to HW filter on device team0
[ 612.368573][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
12:03:42 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 612.396553][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 612.424623][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 612.455417][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 612.485374][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 612.519754][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 612.552106][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 612.585048][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 612.614284][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
12:03:42 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 612.644936][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 612.675943][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 612.703487][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 612.733930][ T9882] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 612.772770][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 612.781594][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 612.796542][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 612.809014][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
12:03:43 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 612.817839][ T3561] bridge0: port 1(bridge_slave_0) entered blocking state
[ 612.824932][ T3561] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 612.860590][ T9885] device veth1_vlan entered promiscuous mode
[ 612.923615][ T9923] 8021q: adding VLAN 0 to HW filter on device bond0
[ 612.930655][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 612.949038][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
12:03:43 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 612.982934][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 612.991903][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 613.032518][ T13] bridge0: port 2(bridge_slave_1) entered blocking state
[ 613.039592][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 613.059449][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 613.081208][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 613.091937][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 613.102390][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 613.111103][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 613.127555][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 613.138138][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 613.148841][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 613.162463][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
12:03:43 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 613.184052][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 613.202087][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 613.212900][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 613.223324][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 613.242149][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 613.252899][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 613.285000][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 613.303430][ T9882] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 613.334243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 613.344576][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 613.363349][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 613.392378][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 613.400586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 613.453166][ T9923] 8021q: adding VLAN 0 to HW filter on device team0
[ 613.461816][ T9882] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 613.502096][ T9882] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 613.510819][ T9882] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 613.535851][ T9882] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 613.583155][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 613.591727][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 613.623037][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
12:03:43 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 613.642384][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 613.672726][ T3563] bridge0: port 1(bridge_slave_0) entered blocking state
[ 613.679800][ T3563] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 613.692453][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 613.701110][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 613.711940][ T3563] bridge0: port 2(bridge_slave_1) entered blocking state
[ 613.719048][ T3563] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 613.733174][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 613.745084][ T9885] device veth0_macvtap entered promiscuous mode
12:03:44 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:44 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 614.250535][ T9885] device veth1_macvtap entered promiscuous mode
[ 614.273101][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 614.281247][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 614.292866][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 614.300791][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 614.333164][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 614.343247][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
12:03:44 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 614.351717][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 614.390623][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 614.413873][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 614.435253][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 614.452911][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 614.557011][ T9923] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 614.582827][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 614.597975][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 614.632716][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 614.652112][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 614.663692][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 614.674269][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 614.692464][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 614.702576][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 614.713519][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
12:03:44 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 614.730353][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 614.764866][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 614.792249][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 614.822129][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 614.840622][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 614.851205][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 614.863884][ T9885] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 614.938318][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 614.952172][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 614.962713][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 614.975106][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 615.002836][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 615.036907][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 615.059142][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 615.082743][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
12:03:45 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 615.102103][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 615.121059][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 615.142092][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 615.164674][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 615.182196][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 615.193451][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 615.203332][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 615.213782][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 615.231173][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 615.252706][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 615.267487][ T9885] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 615.313050][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 615.321808][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
12:03:45 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 615.550215][ T9885] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 615.572989][ T9885] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 615.581713][ T9885] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 615.608887][ T9885] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
12:03:46 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 616.058393][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 616.070859][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 616.244096][ T155] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 616.260311][ T9923] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 616.270072][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 616.273365][ T155] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 616.285949][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 616.307097][ T9250] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 616.326953][ T9250] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 616.340563][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 616.362481][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 616.393667][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
12:03:46 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:46 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 616.550975][ T3570] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 616.559230][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 616.568764][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 616.577530][ T3570] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
12:03:46 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 616.698066][ T9923] device veth0_vlan entered promiscuous mode
[ 616.767048][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 616.798169][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
12:03:46 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:46 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 616.822977][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 616.835753][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 616.855635][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
12:03:47 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:47 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:47 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), 0x0)
12:03:47 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:47 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), 0x0)
12:03:47 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:47 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), 0x0)
[ 617.285501][ T9923] device veth1_vlan entered promiscuous mode
12:03:47 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 617.365385][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 617.388447][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
12:03:47 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940))
12:03:47 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 617.421736][ T9923] device veth0_macvtap entered promiscuous mode
[ 617.446396][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 617.462971][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
12:03:47 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940))
[ 617.544979][ T9923] device veth1_macvtap entered promiscuous mode
[ 617.552965][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 617.572917][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
12:03:47 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940))
12:03:47 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
12:03:47 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:03:47 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:03:48 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), 0x0)
12:03:48 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 617.897588][ T3518] Bluetooth: hci0: command 0x0409 tx timeout
[ 617.936482][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 618.007041][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 618.042532][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
12:03:48 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:03:48 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
[ 618.077457][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 618.112829][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
12:03:48 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
[ 618.139463][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 618.164413][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 618.194425][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 618.234316][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
12:03:48 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), 0x0)
[ 618.254381][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 618.282486][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
12:03:48 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
[ 618.316066][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 618.346873][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
12:03:48 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 618.394456][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 618.413622][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
12:03:48 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
[ 618.446694][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 618.483689][ T9923] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 618.494155][T10108] chnl_net:caif_netlink_parms(): no params data found
12:03:48 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:03:48 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:48 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:03:48 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:03:48 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:03:48 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 618.832449][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 618.842741][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 618.883751][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
12:03:49 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23")
[ 618.925573][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 618.954383][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
12:03:49 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 618.992080][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 619.001940][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 619.042086][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 619.051916][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
12:03:49 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23")
[ 619.092084][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 619.101904][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 619.136844][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 619.162123][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
12:03:49 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
[ 619.197726][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 619.232089][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 619.264629][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 619.294400][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
12:03:49 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
[ 619.326610][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 619.356965][ T9923] batman_adv: batadv0: Interface activated: batadv_slave_1
12:03:49 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23")
[ 619.380680][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 619.392766][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
12:03:49 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:03:49 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cb")
12:03:49 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:03:49 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cb")
12:03:49 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cb")
[ 619.806319][ T9923] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 619.825958][ T9923] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 619.835050][ T9923] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 619.844035][ T9923] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 619.982345][ T3561] Bluetooth: hci0: command 0x041b tx timeout
12:03:50 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:50 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf71")
12:03:50 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab9230", 0x66, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:50 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf71")
12:03:50 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf71")
12:03:50 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f")
12:03:50 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf71")
12:03:50 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f")
12:03:50 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f")
12:03:50 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f")
12:03:51 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f")
12:03:51 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab9230", 0x66, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:51 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f")
12:03:51 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:51 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:51 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:51 executing program 4:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r0 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x7054b5135884cefc)
r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, r1, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:51 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:51 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab9230", 0x66, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:52 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:52 executing program 4:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r0 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x7054b5135884cefc)
r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, r1, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 622.062233][ T7] Bluetooth: hci0: command 0x040f tx timeout
12:03:52 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:52 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:52 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:52 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:52 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:53 executing program 0:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:53 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:53 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:53 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:53 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:53 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:54 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 624.142338][ T7] Bluetooth: hci0: command 0x0419 tx timeout
12:03:54 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 624.222580][ T1382] ieee802154 phy0 wpan0: encryption failed: -22
[ 624.228887][ T1382] ieee802154 phy1 wpan1: encryption failed: -22
12:03:54 executing program 0:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:54 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:55 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:55 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc)
r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:55 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:55 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 625.814873][T10108] bridge0: port 1(bridge_slave_0) entered blocking state
[ 625.844118][T10108] bridge0: port 1(bridge_slave_0) entered disabled state
[ 625.872613][T10108] device bridge_slave_0 entered promiscuous mode
12:03:56 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:56 executing program 4:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:56 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:57 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:57 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 626.920023][T10108] bridge0: port 2(bridge_slave_1) entered blocking state
[ 626.942638][T10108] bridge0: port 2(bridge_slave_1) entered disabled state
[ 626.950934][T10108] device bridge_slave_1 entered promiscuous mode
12:03:57 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:57 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:58 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:58 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:58 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:03:58 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 628.849651][T10108] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 628.929894][T10108] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
12:04:00 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:00 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:00 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:01 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:01 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:01 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:02 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:02 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:03 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:03 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:03 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:04 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 633.855164][ T3570] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 633.869737][ T3570] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 633.927829][T10108] team0: Port device team_slave_0 added
[ 633.958035][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 634.057551][T10108] team0: Port device team_slave_1 added
12:04:04 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:04 executing program 0:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:04 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 634.773598][ T144] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 634.792787][ T144] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 634.794150][T10108] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 634.823753][T10108] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 634.905260][T10108] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 635.108819][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 635.117611][T10108] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 635.127930][T10108] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
12:04:05 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 635.177528][T10108] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
12:04:05 executing program 4:
syz_clone(0xb0188080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940))
12:04:07 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:07 executing program 4:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:08 executing program 4:
syz_clone(0xb0188080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940))
[ 638.466750][T10108] device hsr_slave_0 entered promiscuous mode
12:04:08 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 638.937497][T10108] device hsr_slave_1 entered promiscuous mode
[ 639.104473][T10108] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 639.115507][T10108] Cannot create hsr debugfs directory
12:04:09 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r0 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, r1, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:10 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:10 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:11 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:12 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:12 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:12 executing program 4:
syz_clone(0xb0188080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:13 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:13 executing program 4:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000300))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:13 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:14 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:14 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:15 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:15 executing program 4:
syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:15 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:16 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 646.695713][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0
12:04:16 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:17 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 647.217739][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 647.334807][ T4115] device bridge_slave_1 left promiscuous mode
[ 647.341024][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state
12:04:17 executing program 4:
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:18 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 647.962661][ T4115] device bridge_slave_0 left promiscuous mode
[ 647.968894][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state
12:04:18 executing program 4:
syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 648.425081][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 648.702265][ T1066] Bluetooth: hci2: command 0x0409 tx timeout
[ 648.865558][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1
12:04:19 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:19 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0)
[ 649.338748][ T4115] device bridge_slave_1 left promiscuous mode
[ 649.363327][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state
12:04:19 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 649.962674][ T4115] device bridge_slave_0 left promiscuous mode
[ 649.968888][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state
[ 650.782342][ T8317] Bluetooth: hci2: command 0x041b tx timeout
[ 651.602176][ T4115] device hsr_slave_0 left promiscuous mode
[ 652.152223][ T4115] device hsr_slave_1 left promiscuous mode
[ 652.662295][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 652.669756][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 652.862169][ T7] Bluetooth: hci2: command 0x040f tx timeout
[ 653.034185][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 653.041616][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 653.214222][ T4115] device bridge_slave_1 left promiscuous mode
[ 653.220413][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state
[ 653.808107][ T4115] device bridge_slave_0 left promiscuous mode
[ 653.832241][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state
[ 654.211844][ T4115] device hsr_slave_0 left promiscuous mode
[ 654.662175][ T4115] device hsr_slave_1 left promiscuous mode
[ 654.945814][ T7] Bluetooth: hci2: command 0x0419 tx timeout
[ 655.142263][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 655.149725][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 655.404267][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 655.411722][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 655.644253][ T4115] device bridge_slave_1 left promiscuous mode
[ 655.650450][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state
[ 656.157291][ T4115] device bridge_slave_0 left promiscuous mode
[ 656.172212][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state
[ 657.472237][ T4115] device hsr_slave_0 left promiscuous mode
[ 657.979980][ T4115] device hsr_slave_1 left promiscuous mode
[ 658.452736][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 658.460647][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 658.694740][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 658.712133][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 658.874160][ T4115] device bridge_slave_1 left promiscuous mode
[ 658.880361][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state
[ 659.340223][ T4115] device bridge_slave_0 left promiscuous mode
[ 659.352190][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state
12:04:30 executing program 0:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:30 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0)
12:04:30 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 660.498767][ T4115] device hsr_slave_0 left promiscuous mode
[ 660.530661][ T4115] device hsr_slave_1 left promiscuous mode
[ 660.547965][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 660.564684][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 660.599621][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 660.620833][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1
12:04:30 executing program 1:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0)
12:04:30 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0)
perf_event_open(0x0, 0x0, 0x2, r0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0)
[ 660.962991][ T4115] device bridge_slave_1 left promiscuous mode
[ 660.969182][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state
[ 661.282901][ T4115] device bridge_slave_0 left promiscuous mode
[ 661.289106][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state
12:04:31 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:31 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:32 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x0, 0x0}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 662.316369][ T4115] device hsr_slave_0 left promiscuous mode
12:04:32 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 662.783835][ T4115] device hsr_slave_1 left promiscuous mode
12:04:33 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 663.393152][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 663.400630][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 663.422224][ T7] Bluetooth: hci1: command 0x0409 tx timeout
12:04:33 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 663.834318][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 663.841765][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1
12:04:34 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 664.175441][ T4115] device bridge_slave_1 left promiscuous mode
[ 664.181642][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state
12:04:34 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:34 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 664.752616][ T4115] device bridge_slave_0 left promiscuous mode
[ 664.758820][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state
12:04:35 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:35 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 665.492288][ T3518] Bluetooth: hci1: command 0x041b tx timeout
12:04:36 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 666.315687][ T4115] device veth1_macvtap left promiscuous mode
[ 666.321743][ T4115] device veth0_macvtap left promiscuous mode
[ 666.342275][ T4115] device veth1_vlan left promiscuous mode
[ 666.348081][ T4115] device veth0_vlan left promiscuous mode
12:04:36 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:37 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 667.572286][ T3518] Bluetooth: hci1: command 0x040f tx timeout
12:04:37 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
12:04:38 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:38 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
[ 668.491198][ T4115] device veth1_macvtap left promiscuous mode
[ 668.500498][ T4115] device veth0_macvtap left promiscuous mode
[ 668.522252][ T4115] device veth1_vlan left promiscuous mode
[ 668.528062][ T4115] device veth0_vlan left promiscuous mode
12:04:39 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
12:04:39 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 669.655988][ T3562] Bluetooth: hci1: command 0x0419 tx timeout
[ 669.763004][ T4115] device veth1_macvtap left promiscuous mode
[ 669.769701][ T4115] device veth0_macvtap left promiscuous mode
[ 669.784743][ T4115] device veth1_vlan left promiscuous mode
[ 669.792534][ T4115] device veth0_vlan left promiscuous mode
12:04:40 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
[ 671.420899][ T4115] device veth1_macvtap left promiscuous mode
[ 671.430095][ T4115] device veth0_macvtap left promiscuous mode
[ 671.446635][ T4115] device veth1_vlan left promiscuous mode
[ 671.462001][ T4115] device veth0_vlan left promiscuous mode
12:04:41 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
12:04:41 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:42 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:42 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
12:04:43 executing program 4:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
12:04:43 executing program 4:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
12:04:43 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 673.462966][ T4115] device veth1_macvtap left promiscuous mode
[ 673.469053][ T4115] device veth0_macvtap left promiscuous mode
[ 673.522276][ T4115] device veth1_vlan left promiscuous mode
[ 673.528098][ T4115] device veth0_vlan left promiscuous mode
12:04:44 executing program 4:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
12:04:44 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:44 executing program 4:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
12:04:45 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:04:46 executing program 4:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
12:04:46 executing program 4:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x20)
12:04:46 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:04:47 executing program 4:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20)
12:04:47 executing program 4:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20)
12:04:48 executing program 4:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20)
12:04:48 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:04:48 executing program 4:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20)
syz_clone(0xb0188080, 0x0, 0x0, 0x0, 0x0, 0x0)
12:04:49 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:49 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:49 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:04:50 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:04:50 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:51 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:04:51 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:04:51 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:52 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:04:52 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:04:53 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:53 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:04:54 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:54 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
[ 684.132278][ T3562] Bluetooth: hci3: command 0x0409 tx timeout
12:04:54 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:54 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:04:55 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:04:55 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 685.653868][ T1382] ieee802154 phy0 wpan0: encryption failed: -22
[ 685.660174][ T1382] ieee802154 phy1 wpan1: encryption failed: -22
12:04:56 executing program 4:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
[ 686.212238][ T1066] Bluetooth: hci3: command 0x041b tx timeout
12:04:56 executing program 4:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
12:04:57 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:57 executing program 4:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
[ 687.742255][ T7] Bluetooth: hci5: command 0x0406 tx timeout
12:04:58 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
[ 688.302234][ T8317] Bluetooth: hci3: command 0x040f tx timeout
12:04:58 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
12:04:58 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:04:59 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
12:04:59 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:05:00 executing program 1:
syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:00 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 690.382201][ T7] Bluetooth: hci3: command 0x0419 tx timeout
12:05:01 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:02 executing program 1:
syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:02 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 692.852187][ T1066] Bluetooth: hci6: command 0x0406 tx timeout
12:05:03 executing program 1:
syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:04 executing program 4:
syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:04 executing program 4:
syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:04 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:05 executing program 4:
syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:06 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:06 executing program 4:
syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:05:06 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:05:06 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:07 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:05:07 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:05:08 executing program 4:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
12:05:09 executing program 4:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
12:05:09 executing program 4:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
12:05:10 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
12:05:10 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
12:05:11 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
12:05:12 executing program 4:
syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:12 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:13 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:13 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:13 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20)
12:05:13 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20)
[ 703.734343][ T4115] team0 (unregistering): Port device team_slave_1 removed
[ 703.775072][ T4115] team0 (unregistering): Port device team_slave_0 removed
[ 703.803987][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 703.841790][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
12:05:14 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20)
[ 704.036713][ T4115] bond0 (unregistering): Released all slaves
12:05:14 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20)
[ 704.284909][ T4115] team0 (unregistering): Port device team_slave_1 removed
[ 704.313391][ T4115] team0 (unregistering): Port device team_slave_0 removed
12:05:14 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20)
[ 704.338257][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
12:05:14 executing program 4:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20)
[ 704.493159][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
12:05:14 executing program 4:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
12:05:14 executing program 4:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
[ 704.774097][ T4115] bond0 (unregistering): Released all slaves
12:05:15 executing program 4:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
12:05:15 executing program 4:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20)
12:05:15 executing program 4:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20)
12:05:15 executing program 4:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20)
[ 705.353973][ T4115] team0 (unregistering): Port device team_slave_1 removed
12:05:15 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20)
[ 705.564149][ T4115] team0 (unregistering): Port device team_slave_0 removed
[ 705.606274][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 705.650199][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
12:05:15 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 705.918567][ T4115] bond0 (unregistering): Released all slaves
12:05:16 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:16 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 706.394688][ T4115] team0 (unregistering): Port device team_slave_1 removed
[ 706.422557][ T4115] team0 (unregistering): Port device team_slave_0 removed
12:05:16 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 706.450521][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 706.622693][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
12:05:16 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
12:05:17 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r0 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 707.112783][ T4115] bond0 (unregistering): Released all slaves
[ 708.863852][ T4115] team0 (unregistering): Port device team_slave_1 removed
[ 708.989340][ T4115] team0 (unregistering): Port device team_slave_0 removed
[ 709.232525][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 709.527999][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 709.963274][ T4115] bond0 (unregistering): Released all slaves
[ 711.607953][ T4115] team0 (unregistering): Port device team_slave_1 removed
[ 711.993509][ T4115] team0 (unregistering): Port device team_slave_0 removed
[ 712.177265][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 712.238295][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 713.635686][ T4115] bond0 (unregistering): Released all slaves
[ 714.367585][ T4115] team0 (unregistering): Port device team_slave_1 removed
[ 714.402943][ T4115] team0 (unregistering): Port device team_slave_0 removed
[ 714.552476][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 714.622262][ T7] Bluetooth: hci4: command 0x0409 tx timeout
[ 714.724946][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 715.062870][ T4115] bond0 (unregistering): Released all slaves
[ 715.857913][T10742] chnl_net:caif_netlink_parms(): no params data found
12:05:26 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 716.077077][T10927] chnl_net:caif_netlink_parms(): no params data found
12:05:26 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
12:05:26 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 716.447819][T10927] bridge0: port 1(bridge_slave_0) entered blocking state
[ 716.464403][T10927] bridge0: port 1(bridge_slave_0) entered disabled state
[ 716.506098][T10927] device bridge_slave_0 entered promiscuous mode
[ 716.549821][T11136] chnl_net:caif_netlink_parms(): no params data found
[ 716.574979][T10927] bridge0: port 2(bridge_slave_1) entered blocking state
[ 716.598507][T10927] bridge0: port 2(bridge_slave_1) entered disabled state
[ 716.612717][T10927] device bridge_slave_1 entered promiscuous mode
12:05:26 executing program 4:
r0 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 716.642563][T10742] bridge0: port 1(bridge_slave_0) entered blocking state
[ 716.649712][T10742] bridge0: port 1(bridge_slave_0) entered disabled state
[ 716.683901][T10742] device bridge_slave_0 entered promiscuous mode
[ 716.692393][ T3563] Bluetooth: hci4: command 0x041b tx timeout
12:05:26 executing program 4:
r0 = syz_clone(0x0, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 716.743406][T10742] bridge0: port 2(bridge_slave_1) entered blocking state
[ 716.750473][T10742] bridge0: port 2(bridge_slave_1) entered disabled state
[ 716.783176][T10742] device bridge_slave_1 entered promiscuous mode
[ 716.836021][T10927] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 716.847992][T10927] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 716.867609][T10742] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 716.945139][T10742] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 717.022810][T10927] team0: Port device team_slave_0 added
[ 717.041077][T11136] bridge0: port 1(bridge_slave_0) entered blocking state
[ 717.053972][T11136] bridge0: port 1(bridge_slave_0) entered disabled state
[ 717.079878][T11136] device bridge_slave_0 entered promiscuous mode
12:05:27 executing program 4:
r0 = syz_clone(0x0, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 717.131442][T10927] team0: Port device team_slave_1 added
[ 717.138293][T11136] bridge0: port 2(bridge_slave_1) entered blocking state
[ 717.152226][T11136] bridge0: port 2(bridge_slave_1) entered disabled state
[ 717.160420][T11136] device bridge_slave_1 entered promiscuous mode
[ 717.205721][T10742] team0: Port device team_slave_0 added
[ 717.283897][T10742] team0: Port device team_slave_1 added
[ 717.320192][T10927] batman_adv: batadv0: Adding interface: batadv_slave_0
12:05:27 executing program 4:
r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 717.331254][T10927] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 717.429324][T10927] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 717.444162][T11136] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 717.467201][T11136] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 717.494581][T10927] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 717.501552][T10927] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
12:05:27 executing program 4:
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 717.552129][T10927] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 717.633860][T11136] team0: Port device team_slave_0 added
12:05:27 executing program 4:
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 717.702386][T10742] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 717.709345][T10742] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 717.753764][T10742] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 717.767471][T10742] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 717.774537][T10742] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 717.814548][T10742] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 717.832255][T11136] team0: Port device team_slave_1 added
12:05:28 executing program 4:
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 717.856906][T10927] device hsr_slave_0 entered promiscuous mode
[ 717.873029][T10927] device hsr_slave_1 entered promiscuous mode
[ 717.879689][T10927] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 717.887541][T10927] Cannot create hsr debugfs directory
12:05:28 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
[ 717.970112][T10742] device hsr_slave_0 entered promiscuous mode
[ 717.980111][T10742] device hsr_slave_1 entered promiscuous mode
[ 717.992085][T10742] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 717.999643][T10742] Cannot create hsr debugfs directory
12:05:28 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
[ 718.089924][T11136] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 718.102121][T11136] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 718.152094][T11136] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 718.176278][T11136] batman_adv: batadv0: Adding interface: batadv_slave_1
12:05:28 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
[ 718.192083][T11136] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 718.234469][T11136] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
12:05:28 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 718.419018][T11136] device hsr_slave_0 entered promiscuous mode
[ 718.440363][T11136] device hsr_slave_1 entered promiscuous mode
[ 718.466569][T11136] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 718.482465][T11136] Cannot create hsr debugfs directory
12:05:28 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
12:05:28 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 718.772443][ T1069] Bluetooth: hci4: command 0x040f tx timeout
12:05:29 executing program 4:
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30)
[ 718.830408][T11171] chnl_net:caif_netlink_parms(): no params data found
12:05:29 executing program 4:
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30)
[ 719.043217][T11171] bridge0: port 1(bridge_slave_0) entered blocking state
[ 719.062401][T11171] bridge0: port 1(bridge_slave_0) entered disabled state
[ 719.072586][T11171] device bridge_slave_0 entered promiscuous mode
12:05:29 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 719.122389][T11171] bridge0: port 2(bridge_slave_1) entered blocking state
[ 719.144594][T11171] bridge0: port 2(bridge_slave_1) entered disabled state
[ 719.162987][T11171] device bridge_slave_1 entered promiscuous mode
12:05:29 executing program 4:
r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 719.207143][T10742] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 719.318994][T10742] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 719.342417][ T1066] Bluetooth: hci0: command 0x0409 tx timeout
[ 719.356508][T11171] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
12:05:29 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 719.368030][T11171] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 719.439372][T11171] team0: Port device team_slave_0 added
[ 719.448471][T11171] team0: Port device team_slave_1 added
12:05:29 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 719.517799][T11171] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 719.532132][T11171] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 719.572572][T11171] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 719.617632][T10742] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
12:05:29 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 719.712908][T11171] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 719.719864][T11171] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 719.768222][T11171] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
12:05:29 executing program 4:
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
12:05:30 executing program 4:
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
[ 719.819868][T10742] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
12:05:30 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
[ 719.947161][T11171] device hsr_slave_0 entered promiscuous mode
[ 719.971373][T11171] device hsr_slave_1 entered promiscuous mode
[ 719.993026][T11171] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 720.012133][T11171] Cannot create hsr debugfs directory
12:05:30 executing program 4:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x20)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 720.067632][T11136] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
12:05:30 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 720.257481][T11136] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
12:05:30 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 720.389706][T11136] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
12:05:30 executing program 4:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
syz_clone(0xb0188080, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 720.526631][T11136] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
12:05:30 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:30 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 720.759120][T10927] netdevsim netdevsim3 netdevsim0: renamed from eth0
[ 720.775020][T10927] netdevsim netdevsim3 netdevsim1: renamed from eth1
[ 720.794733][T10927] netdevsim netdevsim3 netdevsim2: renamed from eth2
[ 720.832968][T10927] netdevsim netdevsim3 netdevsim3: renamed from eth3
[ 720.862368][ T1066] Bluetooth: hci4: command 0x0419 tx timeout
[ 720.925480][T10742] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 720.965098][T10742] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 720.992789][T11171] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 721.035136][T10742] netdevsim netdevsim0 netdevsim2: renamed from eth2
12:05:31 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 721.155261][T10927] 8021q: adding VLAN 0 to HW filter on device bond0
[ 721.183019][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 721.190748][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 721.235366][T10927] 8021q: adding VLAN 0 to HW filter on device team0
[ 721.270968][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 721.290370][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 721.314911][ T3532] bridge0: port 1(bridge_slave_0) entered blocking state
[ 721.321980][ T3532] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 721.412242][ T8316] Bluetooth: hci0: command 0x041b tx timeout
12:05:31 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 721.569968][T11171] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 721.637512][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 721.652629][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 721.661217][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 721.702519][ T8313] bridge0: port 2(bridge_slave_1) entered blocking state
[ 721.709587][ T8313] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 721.732585][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 721.741567][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 721.912631][T11171] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
12:05:32 executing program 4:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, 0x0, 0x0, 0x0, 0x0, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.net/syz1\x00', 0x200002, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000001f40), 0x0, 0x0)
[ 722.022483][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 722.031509][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 722.061876][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 722.110984][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 722.132859][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 722.141237][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 722.160497][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 722.171127][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 722.189000][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 722.204366][T10927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 722.239005][T11171] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 722.473178][T11136] netdevsim netdevsim2 netdevsim0: renamed from eth0
[ 722.525190][T10927] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 722.564381][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
12:05:32 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 722.571838][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 722.591679][T11136] netdevsim netdevsim2 netdevsim1: renamed from eth1
[ 722.615795][T11136] netdevsim netdevsim2 netdevsim2: renamed from eth2
[ 722.791544][T11171] netdevsim netdevsim1 netdevsim0: renamed from eth0
[ 722.814478][T11136] netdevsim netdevsim2 netdevsim3: renamed from eth3
[ 722.834694][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 722.844516][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 722.871846][T10927] device veth0_vlan entered promiscuous mode
[ 722.879848][T11171] netdevsim netdevsim1 netdevsim1: renamed from eth1
[ 722.904264][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 722.913976][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 722.926935][T10927] device veth1_vlan entered promiscuous mode
[ 722.935810][T11171] netdevsim netdevsim1 netdevsim2: renamed from eth2
[ 722.977462][T11171] netdevsim netdevsim1 netdevsim3: renamed from eth3
[ 723.029776][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 723.047924][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 723.056025][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 723.115832][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 723.126162][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 723.143846][T10927] device veth0_macvtap entered promiscuous mode
[ 723.189825][T10927] device veth1_macvtap entered promiscuous mode
[ 723.226596][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
12:05:33 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x0, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 723.242374][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 723.253155][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 723.272260][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 723.286636][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 723.300257][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 723.310663][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 723.332965][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 723.353392][T10927] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 723.394627][T11136] 8021q: adding VLAN 0 to HW filter on device bond0
[ 723.415060][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 723.433209][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 723.441201][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 723.477081][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 723.492250][ T7] Bluetooth: hci0: command 0x040f tx timeout
[ 723.494904][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 723.511464][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 723.532716][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 723.552640][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 723.563109][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 723.585090][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 723.604745][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 723.619364][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 723.656843][T10927] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 723.705624][T11136] 8021q: adding VLAN 0 to HW filter on device team0
[ 723.729269][T11284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 723.742860][T11284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 723.751532][T11284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 723.759367][T11284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 723.769807][T10927] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 723.780591][T10927] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 723.790236][T10927] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 723.799467][T10927] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
12:05:34 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
openat$tun(0xffffffffffffff9c, &(0x7f0000001f40), 0x20402, 0x0)
[ 723.842237][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 723.852899][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 723.892735][ T3561] bridge0: port 1(bridge_slave_0) entered blocking state
[ 723.899811][ T3561] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 723.923484][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 723.964790][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 723.983053][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 723.992801][ T8313] bridge0: port 2(bridge_slave_1) entered blocking state
[ 723.999869][ T8313] bridge0: port 2(bridge_slave_1) entered forwarding state
12:05:34 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000001f40), 0x20402, 0x0)
[ 724.060920][T11171] 8021q: adding VLAN 0 to HW filter on device bond0
[ 724.089184][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 724.111405][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 724.133231][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 724.142731][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 724.151173][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 724.173322][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 724.181784][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 724.195384][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 724.243179][T11171] 8021q: adding VLAN 0 to HW filter on device team0
[ 724.254587][T11136] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 724.276148][T11136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 724.308877][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 724.332825][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 724.351319][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 724.382856][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 724.402520][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 724.546655][ T144] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 724.559386][ T144] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 724.573800][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
12:05:34 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 724.592661][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 724.601233][ T21] bridge0: port 1(bridge_slave_0) entered blocking state
[ 724.608336][ T21] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 724.677718][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 724.693369][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 724.701761][ T21] bridge0: port 2(bridge_slave_1) entered blocking state
[ 724.708866][ T21] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 724.730268][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 724.815951][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 724.829525][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 724.873169][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 724.881913][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 724.913535][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 724.933040][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 724.941736][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
12:05:35 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 724.961945][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 724.971856][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 724.996125][T11171] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 725.014824][T11171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 725.042771][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 725.062480][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 725.344479][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 725.353047][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 725.361413][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
12:05:35 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 725.402874][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 725.426939][T11136] 8021q: adding VLAN 0 to HW filter on device batadv0
12:05:35 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:35 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:35 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 725.582128][ T3532] Bluetooth: hci0: command 0x0419 tx timeout
[ 725.652308][ T6590] Bluetooth: hci1: command 0x0409 tx timeout
12:05:35 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:36 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:36 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:36 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:36 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:36 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:37 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:37 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
12:05:37 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:37 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 727.732685][ T6590] Bluetooth: hci1: command 0x041b tx timeout
12:05:38 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:38 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
12:05:38 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x1d, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 728.512433][T11284] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 728.519955][T11284] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
12:05:38 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
12:05:39 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x1d, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:39 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x1d, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:39 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
[ 729.812289][ T25] Bluetooth: hci1: command 0x040f tx timeout
12:05:40 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:40 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
12:05:40 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:41 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
12:05:41 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:41 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 731.892137][ T25] Bluetooth: hci1: command 0x0419 tx timeout
12:05:42 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
12:05:42 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 732.294805][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 732.303617][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
12:05:42 executing program 4:
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
[ 733.119125][T11136] device veth0_vlan entered promiscuous mode
12:05:43 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 734.217470][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 734.226176][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 734.295631][T11136] device veth1_vlan entered promiscuous mode
[ 734.318331][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 734.334510][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 734.362457][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 734.369961][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 734.416822][T11171] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 734.432956][T11282] chnl_net:caif_netlink_parms(): no params data found
12:05:44 executing program 4:
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
12:05:45 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 735.362430][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 735.371165][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 735.394022][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 735.422724][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
12:05:45 executing program 4:
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
12:05:46 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:46 executing program 4:
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
[ 736.310930][T11171] device veth0_vlan entered promiscuous mode
[ 736.356649][T11136] device veth0_macvtap entered promiscuous mode
[ 736.414988][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 736.442766][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 736.451077][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
12:05:46 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:47 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:47 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 738.107590][T11171] device veth1_vlan entered promiscuous mode
[ 738.155611][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 738.172735][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 738.200220][T11136] device veth1_macvtap entered promiscuous mode
12:05:48 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:49 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:49 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 740.065766][T11282] bridge0: port 1(bridge_slave_0) entered blocking state
[ 740.092184][T11282] bridge0: port 1(bridge_slave_0) entered disabled state
[ 740.102284][T11282] device bridge_slave_0 entered promiscuous mode
12:05:50 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:50 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 740.348370][T11282] bridge0: port 2(bridge_slave_1) entered blocking state
[ 740.361439][T11282] bridge0: port 2(bridge_slave_1) entered disabled state
[ 740.393521][T11282] device bridge_slave_1 entered promiscuous mode
[ 740.407757][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 740.462185][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 740.493032][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 740.512074][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 740.521889][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 740.542081][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 740.551909][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 740.576212][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 740.602098][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 740.613577][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 740.633582][T11136] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 740.713993][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 740.732795][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 740.741522][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 740.773084][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 740.785493][T11171] device veth0_macvtap entered promiscuous mode
[ 740.821277][T11282] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 740.848577][T11282] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 740.873353][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 740.902141][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 740.911958][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 740.953877][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 740.972174][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 740.999809][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 741.022083][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 741.073980][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 741.091246][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 741.111450][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 741.128386][T11136] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 741.145882][T11171] device veth1_macvtap entered promiscuous mode
12:05:51 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:51 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 742.368045][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 742.385201][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
12:05:52 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:52 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:53 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:53 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 743.035231][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 743.052829][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 743.085285][T11136] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 743.102118][T11136] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 743.110820][T11136] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 743.142838][T11136] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 743.201332][T11282] team0: Port device team_slave_0 added
[ 743.215950][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 743.242432][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 743.272744][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 743.292177][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 743.314360][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 743.340334][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 743.363233][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 743.392115][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 743.401945][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 743.431203][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 743.451632][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 743.476593][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 743.502344][T11171] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 743.519302][T11282] team0: Port device team_slave_1 added
[ 743.528571][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 743.552823][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
12:05:53 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x0, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 744.017163][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 744.027661][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 744.070247][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 744.097746][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 744.121201][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 744.146035][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 744.171520][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 744.200255][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 744.225499][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 744.250702][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 744.277828][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 744.304399][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
12:05:54 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 744.331538][T11171] batman_adv: batadv0: Interface activated: batadv_slave_1
12:05:54 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x0, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 744.376282][T11282] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 744.388740][T11282] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 744.478861][T11282] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 744.728300][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 744.749832][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
12:05:54 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x0, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 744.775742][T11171] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 744.810927][T11171] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 744.832093][T11171] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 744.840794][T11171] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
12:05:55 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 744.873295][T11282] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 744.880939][T11282] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 744.992079][T11282] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
12:05:55 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:55 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 745.344273][T11282] device hsr_slave_0 entered promiscuous mode
[ 745.363086][T11282] device hsr_slave_1 entered promiscuous mode
[ 745.379435][T11282] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 745.423982][T11282] Cannot create hsr debugfs directory
[ 745.452591][ T4228] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 745.460539][ T4228] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 745.532789][ T153] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 745.540765][ T153] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 745.613932][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 745.813602][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
12:05:56 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:56 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:56 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 745.855381][ T4228] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 745.877601][ T4228] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
12:05:56 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:56 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:56 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:56 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:56 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:56 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800)="8b", 0x1, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:57 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x0, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:57 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
[ 747.122472][ T1382] ieee802154 phy0 wpan0: encryption failed: -22
[ 747.128780][ T1382] ieee802154 phy1 wpan1: encryption failed: -22
12:05:57 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800)="8b", 0x1, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:57 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:05:58 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x0, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:58 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:58 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:05:58 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x0, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:58 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:58 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
[ 749.056586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
12:05:59 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 749.506892][ T4228] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 749.543161][ T4228] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
12:05:59 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 749.556363][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
12:05:59 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, 0x0, 0x29, 0x0, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:05:59 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:05:59 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:00 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:00 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:00 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:00 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:00 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, 0x0, 0x29, 0x0, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:00 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:01 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:01 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:01 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:01 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, 0x0, 0x29, 0x0, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:02 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:02 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:02 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:02 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:02 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:03 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:03 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:03 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:03 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:04 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:04 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:04 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:04 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:05 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:05 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:06 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:06 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:06 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, 0x0)
12:06:06 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:06 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:07 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:07 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:07 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, 0x0)
12:06:07 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:08 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:09 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:09 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:09 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:09 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, 0x0)
12:06:09 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:10 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:10 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940))
12:06:10 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:10 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:11 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:11 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:11 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940))
12:06:11 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:12 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:12 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:12 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:12 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:13 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940))
12:06:13 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:13 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:14 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:15 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8b", 0x1, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:15 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:15 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:16 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:06:16 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:16 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8b", 0x1, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:16 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:17 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:06:17 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:17 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:18 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:18 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8b", 0x1, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:18 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:18 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:06:19 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:19 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d", 0x23, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:19 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
[ 770.316714][T11282] netdevsim netdevsim0 netdevsim0: renamed from eth0
12:06:20 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:06:20 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:20 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:20 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
[ 770.867215][T11282] netdevsim netdevsim0 netdevsim1: renamed from eth1
12:06:21 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d", 0x23, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 771.410865][T11282] netdevsim netdevsim0 netdevsim2: renamed from eth2
12:06:21 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:22 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
[ 772.144598][T11282] netdevsim netdevsim0 netdevsim3: renamed from eth3
12:06:22 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:22 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:22 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d", 0x23, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:23 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:06:23 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:24 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
[ 774.004243][T11282] 8021q: adding VLAN 0 to HW filter on device bond0
[ 774.048788][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 774.057863][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 774.116767][T11282] 8021q: adding VLAN 0 to HW filter on device team0
[ 774.163019][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 774.173276][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 774.181649][ T1069] bridge0: port 1(bridge_slave_0) entered blocking state
[ 774.188770][ T1069] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 774.292753][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 774.300735][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 774.330944][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
12:06:24 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:24 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
[ 774.354741][ T21] bridge0: port 2(bridge_slave_1) entered blocking state
[ 774.361811][ T21] bridge0: port 2(bridge_slave_1) entered forwarding state
12:06:24 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:24 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
[ 774.402883][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 774.430010][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 774.445133][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 774.484121][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 774.569612][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 774.583837][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 774.603131][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 774.611603][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 774.692935][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 774.701228][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 774.743027][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 774.764923][T11282] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
12:06:25 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
[ 775.105581][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 775.113062][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 775.130473][T11282] 8021q: adding VLAN 0 to HW filter on device batadv0
12:06:25 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
[ 775.224667][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 775.233533][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 775.292715][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 775.300935][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 775.346252][T11282] device veth0_vlan entered promiscuous mode
[ 775.360612][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 775.369525][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 775.403330][T11282] device veth1_vlan entered promiscuous mode
[ 775.479183][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 775.487509][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 775.532855][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 775.541467][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 775.603951][T11282] device veth0_macvtap entered promiscuous mode
[ 775.641542][T11282] device veth1_macvtap entered promiscuous mode
[ 775.706212][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 775.742638][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 775.776721][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 775.842219][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 775.872149][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 775.908186][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 775.952951][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 776.002491][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 776.033344][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
12:06:26 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
[ 776.075267][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 776.138937][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 776.171522][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 776.212200][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 776.246651][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 776.294727][T11282] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 776.305258][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 776.316644][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 776.335051][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 776.368570][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
12:06:26 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:26 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:26 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:06:26 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:26 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:27 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:27 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:27 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:06:27 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:27 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:27 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:27 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:28 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:28 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:28 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:28 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d", 0x3c, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:29 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:06:29 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:29 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:29 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:29 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:30 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
12:06:31 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23")
12:06:31 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
[ 781.400414][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 781.436962][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 781.472080][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 781.515553][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 781.540194][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 781.572070][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 781.594990][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
12:06:31 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500))
[ 781.632182][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 781.680523][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 781.739066][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 781.782080][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 781.823692][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 781.864411][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 781.902417][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 781.936908][T11282] batman_adv: batadv0: Interface activated: batadv_slave_1
12:06:32 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 781.993172][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 782.001858][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 782.045605][T11282] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 782.090760][T11282] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 782.103470][T11282] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 782.153017][T11282] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
12:06:32 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
12:06:32 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:32 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23")
12:06:32 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
12:06:33 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
12:06:33 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:33 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:33 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:33 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
12:06:33 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23")
12:06:33 executing program 4:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
12:06:33 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:33 executing program 4:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
12:06:34 executing program 4:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
12:06:34 executing program 4:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d", 0x3c, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:34 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:34 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:34 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:06:34 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:34 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:06:35 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:06:35 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:06:35 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b", 0x38, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:35 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:06:36 executing program 4:
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
12:06:36 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab9230", 0x66, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:36 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:06:36 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:06:36 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b", 0x38, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:37 executing program 4:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:06:37 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:06:37 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:38 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b", 0x38, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:38 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab9230", 0x66, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:38 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:39 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893")
12:06:39 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:40 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab9230", 0x66, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:40 executing program 4:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
12:06:40 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893")
12:06:41 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:41 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
[ 792.052356][T11543] Bluetooth: hci1: command 0x0409 tx timeout
12:06:42 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:42 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893")
12:06:42 executing program 4:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
12:06:43 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:43 executing program 4:
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
12:06:43 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f")
12:06:43 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:43 executing program 4:
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
[ 794.132740][T11547] Bluetooth: hci1: command 0x041b tx timeout
12:06:44 executing program 4:
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
12:06:44 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 794.867200][T12407] chnl_net:caif_netlink_parms(): no params data found
12:06:45 executing program 4:
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
12:06:45 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f")
[ 795.313454][T12407] bridge0: port 1(bridge_slave_0) entered blocking state
[ 795.333112][T12407] bridge0: port 1(bridge_slave_0) entered disabled state
[ 795.414302][T12407] device bridge_slave_0 entered promiscuous mode
[ 795.641782][T12407] bridge0: port 2(bridge_slave_1) entered blocking state
[ 795.692151][T12407] bridge0: port 2(bridge_slave_1) entered disabled state
[ 795.726059][T12407] device bridge_slave_1 entered promiscuous mode
12:06:45 executing program 4:
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
12:06:46 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f")
[ 796.005625][T12407] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 796.065315][T12407] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 796.212461][ T3563] Bluetooth: hci1: command 0x040f tx timeout
[ 796.287080][T12407] team0: Port device team_slave_0 added
[ 796.305995][T12407] team0: Port device team_slave_1 added
[ 796.504162][T12407] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 796.532084][T12407] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 796.642260][T12407] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
12:06:47 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 796.842894][T12407] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 796.849862][T12407] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 796.954269][T12407] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
12:06:47 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:48 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f")
[ 798.293135][T11543] Bluetooth: hci1: command 0x0419 tx timeout
12:06:49 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:49 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:06:49 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 799.290456][T12407] device hsr_slave_0 entered promiscuous mode
[ 799.335346][T12407] device hsr_slave_1 entered promiscuous mode
[ 799.442303][T12407] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 799.449886][T12407] Cannot create hsr debugfs directory
12:06:51 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:51 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:06:52 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:52 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20)
syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:06:52 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:53 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
12:06:53 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:54 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 804.854853][T12407] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 805.492300][T11547] Bluetooth: hci3: command 0x0406 tx timeout
12:06:55 executing program 2:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
12:06:55 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:55 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:56 executing program 2:
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
[ 806.774528][ T4115] device hsr_slave_0 left promiscuous mode
12:06:57 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 807.407889][ T4115] device hsr_slave_1 left promiscuous mode
12:06:57 executing program 2:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:06:57 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 808.152997][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 808.533769][ T1382] ieee802154 phy0 wpan0: encryption failed: -22
[ 808.540072][ T1382] ieee802154 phy1 wpan1: encryption failed: -22
[ 808.944654][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 809.466905][ T4115] device bridge_slave_1 left promiscuous mode
[ 809.473165][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state
12:06:59 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:00 executing program 2:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:00 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 810.680619][ T4115] device bridge_slave_0 left promiscuous mode
[ 810.689067][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state
12:07:00 executing program 2:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:00 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 810.728893][ T4115] device hsr_slave_0 left promiscuous mode
[ 810.746116][ T4115] device hsr_slave_1 left promiscuous mode
[ 810.758384][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 810.770406][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 810.814294][ T4115] device bridge_slave_1 left promiscuous mode
[ 810.820494][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state
[ 811.686230][ T4115] device bridge_slave_0 left promiscuous mode
[ 811.699037][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state
12:07:02 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 813.117172][ T4115] device hsr_slave_0 left promiscuous mode
12:07:03 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:03 executing program 2:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 814.355346][ T4115] device hsr_slave_1 left promiscuous mode
[ 814.908868][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 814.932516][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0
12:07:05 executing program 2:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 815.505735][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 815.526913][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 815.801354][ T4115] device bridge_slave_1 left promiscuous mode
[ 815.810048][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state
[ 815.828051][ T4115] device bridge_slave_0 left promiscuous mode
[ 815.840114][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state
[ 815.864705][ T4115] device hsr_slave_0 left promiscuous mode
[ 817.112455][ T4115] device hsr_slave_1 left promiscuous mode
[ 818.280939][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 818.288558][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 819.321702][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 819.360867][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 820.025181][ T4115] device bridge_slave_1 left promiscuous mode
[ 820.031390][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state
[ 821.464146][ T4115] device bridge_slave_0 left promiscuous mode
[ 821.470371][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state
[ 825.132431][ T4115] device hsr_slave_0 left promiscuous mode
12:07:16 executing program 4:
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10)
12:07:16 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:16 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:16 executing program 2:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 825.934023][ T4115] device hsr_slave_1 left promiscuous mode
[ 825.975332][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 825.985857][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 826.001632][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 826.018624][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 826.032241][ T4115] device bridge_slave_1 left promiscuous mode
[ 826.041917][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state
[ 826.054473][ T4115] device bridge_slave_0 left promiscuous mode
[ 826.064164][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state
[ 826.493688][ T4115] device hsr_slave_0 left promiscuous mode
12:07:16 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:17 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 827.430309][ T4115] device hsr_slave_1 left promiscuous mode
12:07:17 executing program 2:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:18 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:18 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, 0x0)
[ 828.794304][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0
12:07:19 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 829.407853][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 829.492561][ T8313] Bluetooth: hci2: command 0x0409 tx timeout
12:07:20 executing program 2:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 830.034969][ T4115] device bridge_slave_1 left promiscuous mode
[ 830.041178][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state
12:07:21 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, 0x0)
[ 831.075052][ T4115] device bridge_slave_0 left promiscuous mode
[ 831.085035][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state
12:07:21 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:21 executing program 2:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, 0x0)
[ 831.583823][ T3563] Bluetooth: hci2: command 0x041b tx timeout
12:07:23 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, 0x0)
12:07:23 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:23 executing program 2:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, 0x0)
[ 833.652256][ T3563] Bluetooth: hci2: command 0x040f tx timeout
[ 833.802462][ T4115] device veth1_macvtap left promiscuous mode
[ 833.808565][ T4115] device veth0_macvtap left promiscuous mode
[ 833.829569][ T4115] device veth1_vlan left promiscuous mode
[ 833.852985][ T4115] device veth0_vlan left promiscuous mode
12:07:24 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:25 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940))
12:07:25 executing program 2:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, 0x0)
12:07:25 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 835.732330][ T21] Bluetooth: hci2: command 0x0419 tx timeout
12:07:26 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940))
[ 836.212307][ T21] Bluetooth: hci4: command 0x0406 tx timeout
12:07:26 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:27 executing program 2:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 837.610014][ T4115] device veth1_macvtap left promiscuous mode
[ 837.628013][ T4115] device veth0_macvtap left promiscuous mode
[ 837.639527][ T4115] device veth1_vlan left promiscuous mode
12:07:27 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 837.675792][ T4115] device veth0_vlan left promiscuous mode
12:07:27 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940))
12:07:28 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0)
12:07:29 executing program 2:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:29 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:07:30 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0)
12:07:30 executing program 2:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:31 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:07:31 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0)
[ 841.332568][T11547] Bluetooth: hci0: command 0x0406 tx timeout
[ 841.880516][T12794] cgroup: fork rejected by pids controller in /syz2
12:07:32 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
[ 842.602422][ T4115] device veth1_macvtap left promiscuous mode
[ 842.608528][ T4115] device veth0_macvtap left promiscuous mode
[ 842.632328][ T4115] device veth1_vlan left promiscuous mode
[ 842.638140][ T4115] device veth0_vlan left promiscuous mode
12:07:32 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940))
12:07:33 executing program 2:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:07:34 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940))
12:07:34 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:07:34 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940))
12:07:35 executing program 2:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:07:36 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:07:36 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:07:36 executing program 2:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:07:37 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:07:38 executing program 2:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0)
12:07:38 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:07:39 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935")
12:07:39 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:07:39 executing program 2:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:07:39 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:07:40 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:07:41 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:07:41 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:07:43 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:07:44 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23")
12:07:44 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:07:45 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23")
12:07:46 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:07:46 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23")
[ 858.132260][ T21] Bluetooth: hci4: command 0x0409 tx timeout
12:07:48 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:07:49 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
12:07:49 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
[ 860.212274][ T1069] Bluetooth: hci4: command 0x041b tx timeout
12:07:50 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23")
12:07:51 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23")
[ 862.292226][ T21] Bluetooth: hci4: command 0x040f tx timeout
12:07:52 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:07:53 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893")
12:07:54 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23")
[ 864.372388][T11547] Bluetooth: hci4: command 0x0419 tx timeout
[ 864.458890][ T4115] team0 (unregistering): Port device team_slave_1 removed
[ 864.535751][ T4115] team0 (unregistering): Port device team_slave_0 removed
[ 864.558768][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 864.592913][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
12:07:54 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:07:55 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:07:56 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
[ 866.234905][ T4115] bond0 (unregistering): Released all slaves
12:07:56 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:07:57 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:07:57 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:07:58 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893")
12:07:58 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498")
[ 869.973433][ T1382] ieee802154 phy0 wpan0: encryption failed: -22
[ 869.979750][ T1382] ieee802154 phy1 wpan1: encryption failed: -22
12:08:00 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893")
12:08:00 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498")
12:08:01 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893")
12:08:02 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498")
12:08:03 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f")
12:08:04 executing program 2:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:08:04 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893")
12:08:04 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f")
12:08:06 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f")
12:08:07 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893")
[ 878.462423][ T8313] Bluetooth: hci5: command 0x0409 tx timeout
12:08:08 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f")
12:08:09 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893")
12:08:09 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:08:09 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
[ 879.739943][ T4115] team0 (unregistering): Port device team_slave_1 removed
[ 879.771156][ T4115] team0 (unregistering): Port device team_slave_0 removed
[ 879.784944][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 879.825629][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 880.532315][ T8313] Bluetooth: hci5: command 0x041b tx timeout
12:08:12 executing program 3:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
[ 882.622392][ T8317] Bluetooth: hci5: command 0x040f tx timeout
12:08:13 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c")
[ 884.702250][ T8316] Bluetooth: hci5: command 0x0419 tx timeout
12:08:14 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
[ 884.795881][ T4115] bond0 (unregistering): Released all slaves
12:08:16 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c")
12:08:18 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0)
12:08:21 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0)
12:08:23 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:08:25 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 895.394107][ T4115] team0 (unregistering): Port device team_slave_1 removed
[ 895.582885][ T3532] Bluetooth: hci3: command 0x0409 tx timeout
[ 895.945275][ T4115] team0 (unregistering): Port device team_slave_0 removed
[ 896.907361][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 897.662165][ T3532] Bluetooth: hci3: command 0x041b tx timeout
12:08:28 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 898.598315][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 899.742189][ T3532] Bluetooth: hci3: command 0x040f tx timeout
12:08:30 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 900.307051][ T4115] bond0 (unregistering): Released all slaves
[ 901.822160][ T8313] Bluetooth: hci3: command 0x0419 tx timeout
12:08:33 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:08:36 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:08:37 executing program 3:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4")
12:08:40 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 910.622254][ T8313] Bluetooth: hci6: command 0x0409 tx timeout
[ 912.692333][ T1069] Bluetooth: hci6: command 0x041b tx timeout
[ 913.012328][ T21] Bluetooth: hci1: command 0x0406 tx timeout
12:08:43 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 913.544116][ T4115] team0 (unregistering): Port device team_slave_1 removed
[ 914.781995][T11547] Bluetooth: hci6: command 0x040f tx timeout
[ 914.950931][ T4115] team0 (unregistering): Port device team_slave_0 removed
[ 915.065400][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
12:08:45 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 916.165689][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 916.852256][T11547] Bluetooth: hci6: command 0x0419 tx timeout
12:08:49 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:08:50 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 922.282965][ T4115] bond0 (unregistering): Released all slaves
12:08:52 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 924.132246][T11547] Bluetooth: hci7: command 0x0409 tx timeout
12:08:55 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 926.212264][ T3563] Bluetooth: hci7: command 0x041b tx timeout
12:08:56 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:08:57 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 928.292171][ T3563] Bluetooth: hci7: command 0x040f tx timeout
12:08:59 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:09:00 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 930.372284][ T3563] Bluetooth: hci7: command 0x0419 tx timeout
[ 931.413358][ T1382] ieee802154 phy0 wpan0: encryption failed: -22
[ 931.419657][ T1382] ieee802154 phy1 wpan1: encryption failed: -22
12:09:02 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:09:04 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 935.943446][ T4115] team0 (unregistering): Port device team_slave_1 removed
[ 937.250032][ T4115] team0 (unregistering): Port device team_slave_0 removed
12:09:08 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
[ 937.990631][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
12:09:09 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 939.411547][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
12:09:10 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:09:12 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 943.739316][ T4115] bond0 (unregistering): Released all slaves
[ 944.372224][ T21] Bluetooth: hci8: command 0x0409 tx timeout
12:09:14 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:09:16 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 946.452218][ T21] Bluetooth: hci8: command 0x041b tx timeout
[ 948.532186][ T21] Bluetooth: hci8: command 0x040f tx timeout
12:09:18 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b", 0x38, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:09:20 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b", 0x38, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 950.622111][ T21] Bluetooth: hci8: command 0x0419 tx timeout
12:09:21 executing program 1:
syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b", 0x38, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 952.731326][ T4115] team0 (unregistering): Port device team_slave_1 removed
[ 953.172672][ T4115] team0 (unregistering): Port device team_slave_0 removed
12:09:23 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 953.708736][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 953.972142][ T21] Bluetooth: hci2: command 0x0406 tx timeout
[ 954.912767][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
12:09:26 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:09:27 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
12:09:29 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 960.462930][ T4115] bond0 (unregistering): Released all slaves
12:09:31 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a")
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20)
openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0)
syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97")
[ 961.652163][ T21] Bluetooth: hci9: command 0x0409 tx timeout
[ 962.835839][T12407] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
12:09:33 executing program 1:
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2)
[ 963.732227][ T21] Bluetooth: hci9: command 0x041b tx timeout
[ 964.052495][ T27] INFO: task kworker/1:8:11543 blocked for more than 143 seconds.
[ 964.060544][ T27] Not tainted 5.15.149-syzkaller #0
[ 964.092073][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 964.100768][ T27] task:kworker/1:8 state:D stack:25176 pid:11543 ppid: 2 flags:0x00004000
[ 964.131319][ T27] Workqueue: events nsim_dev_trap_report_work
[ 964.142063][ T27] Call Trace:
[ 964.145361][ T27]
[ 964.148291][ T27] __schedule+0x12c4/0x45b0
[ 964.162076][ T27] ? mark_lock+0x98/0x340
[ 964.166505][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 964.182062][ T27] ? __sched_text_start+0x8/0x8
[ 964.186932][ T27] ? __mutex_trylock_common+0x8d/0x2e0
[ 964.232121][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 964.237360][ T27] ? _raw_spin_unlock_irq+0x1f/0x40
[ 964.252842][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 964.258109][ T27] schedule+0x11b/0x1f0
[ 964.281215][ T27] schedule_preempt_disabled+0xf/0x20
[ 964.298404][ T27] __mutex_lock_common+0xe34/0x25a0
[ 964.304099][ T27] ? nsim_dev_trap_report_work+0x56/0xab0
[ 964.309840][ T27] ? mutex_lock_io_nested+0x60/0x60
[ 964.323417][ T27] mutex_lock_nested+0x17/0x20
[ 964.328220][ T27] nsim_dev_trap_report_work+0x56/0xab0
[ 964.334281][ T27] ? print_irqtrace_events+0x210/0x210
[ 964.342332][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130
[ 964.348247][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 964.362073][ T27] process_one_work+0x8a1/0x10c0
[ 964.367143][ T27] ? worker_detach_from_pool+0x260/0x260
[ 964.384373][ T27] ? _raw_spin_lock_irqsave+0x120/0x120
[ 964.389944][ T27] ? kthread_data+0x4e/0xc0
[ 964.403467][ T27] ? wq_worker_running+0x97/0x170
[ 964.414690][ T27] worker_thread+0xaca/0x1280
[ 964.420064][ T27] kthread+0x3f6/0x4f0
[ 964.433610][ T27] ? rcu_lock_release+0x20/0x20
[ 964.438486][ T27] ? kthread_blkcg+0xd0/0xd0
[ 964.452280][ T27] ret_from_fork+0x1f/0x30
[ 964.461307][ T27]
[ 964.468255][ T27]
[ 964.468255][ T27] Showing all locks held in the system:
[ 964.488220][ T27] 3 locks held by kworker/0:0/7:
[ 964.498610][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0
[ 964.520699][ T27] #1: ffffc90000cc7d20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0
[ 964.543979][ T27] #2: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50
[ 964.570734][ T27] 4 locks held by kworker/1:0/21:
[ 964.582951][ T27] #0: ffff8880b9b39718 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140
12:09:34 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x2)
[ 964.602154][ T27] #1: ffff8880b9b27848 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x53d/0x810
[ 964.630230][ T27] #2: ffff8880b9b28098 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x120/0x260
[ 964.672132][ T27] #3: ffff888061d9c8e0 (&nsim_trap_data->trap_lock){+.+.}-{2:2}, at: nsim_dev_trap_report_work+0x1a3/0xab0
[ 964.692415][ T27] 1 lock held by khungtaskd/27:
[ 964.697282][ T27] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30
[ 964.722068][ T27] 5 locks held by kworker/u4:1/144:
[ 964.727289][ T27] 2 locks held by kworker/u4:2/153:
[ 964.741973][ T27] 2 locks held by kworker/0:2/1066:
[ 964.752063][ T27] #0: ffff888011c72138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0
[ 964.775865][ T27] #1: ffffc9000522fd20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0
[ 964.816540][ T27] 1 lock held by dhcpcd/3173:
[ 964.821243][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: __netlink_dump_start+0x12e/0x6f0
[ 964.872082][ T27] 2 locks held by getty/3256:
[ 964.876778][ T27] #0: ffff88814a9c7098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70
[ 964.922085][ T27] #1: ffffc90002bab2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0
[ 964.952857][ T27] 4 locks held by kworker/u4:6/4115:
[ 964.958166][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0
[ 964.996433][ T27] #1: ffffc9000b7f7d20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0
[ 965.022215][ T27] #2: ffffffff8d9cff10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60
[ 965.031638][ T27] #3: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: netdev_run_todo+0xa4f/0xc40
[ 965.072844][ T27] 3 locks held by kworker/0:13/8313:
[ 965.078157][ T27] #0: ffff8880242f2d38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0
[ 965.122364][ T27] #1: ffffc90003c6fd20 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0
[ 965.157329][ T27] #2: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20
[ 965.192126][ T27] 4 locks held by syz-executor.1/11171:
[ 965.197690][ T27] #0: ffffffff8c9aaa30 (dup_mmap_sem){.+.+}-{0:0}, at: copy_mm+0x223/0x1370
[ 965.218248][ T27] #1: ffff888078737828 (&mm->mmap_lock){++++}-{3:3}, at: copy_mm+0x242/0x1370
[ 965.251186][ T27] #2: ffff888024ee5528 (&mm->mmap_lock/1){+.+.}-{3:3}, at: copy_mm+0x35c/0x1370
[ 965.287389][ T27] #3: ffff8880775bdbe0 (&mapping->i_mmap_rwsem){++++}-{3:3}, at: copy_mm+0xad0/0x1370
[ 965.316471][ T27] 3 locks held by kworker/1:8/11543:
[ 965.321784][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0
[ 965.346810][ T27] #1: ffffc90003987d20 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0
[ 965.370702][ T27] #2: ffff88807b581400 (&nsim_dev->port_list_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x56/0xab0
[ 965.392412][ T27] 1 lock held by syz-executor.4/11611:
[ 965.397884][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0
[ 965.421870][ T27] 7 locks held by syz-executor.0/12407:
[ 965.431275][ T27] #0: ffff88807f4a8460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x29a/0xe50
[ 965.457095][ T27] #1: ffff88807ec90c88 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0
[ 965.474858][ T27] #2: ffff88801a5221d8 (kn->active#233){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0
[ 965.498104][ T27] #3: ffffffff8d357ae8 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xf1/0x470
[ 965.522072][ T27] #4: ffff88807b580178 (&dev->mutex){....}-{3:3}, at: device_release_driver_internal+0xc2/0x7f0
[ 965.548531][ T27] #5: ffff88807b581400 (&nsim_dev->port_list_lock){+.+.}-{3:3}, at: nsim_dev_reload_destroy+0x118/0x240
[ 965.560801][ T27] #6: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: netdev_run_todo+0xa4f/0xc40
[ 965.570413][ T27] 3 locks held by syz-executor.1/12529:
[ 965.590881][ T27] 2 locks held by syz-executor.1/12650:
[ 965.596843][ T27] 3 locks held by syz-executor.4/12660:
[ 965.612066][ T27] #0: ffff88807f410ff0 (&hdev->req_lock){+.+.}-{3:3}, at: hci_dev_do_close+0x63/0x1070
[ 965.642292][ T27] #1: ffff88807f410078 (&hdev->lock){+.+.}-{3:3}, at: hci_dev_do_close+0x431/0x1070
[ 965.651829][ T27] #2: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740
[ 965.699592][ T27] 3 locks held by syz-executor.1/12667:
[ 965.705664][ T27] 2 locks held by syz-executor.3/12669:
[ 965.711221][ T27] 3 locks held by syz-executor.1/12682:
[ 965.735083][ T27] 2 locks held by syz-executor.1/12705:
[ 965.740661][ T27] 1 lock held by syz-executor.2/12721:
[ 965.772067][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0
[ 965.781082][ T27] 1 lock held by syz-executor.3/12750:
[ 965.805768][ T27] #0: ffff88814b110bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 965.812214][ T21] Bluetooth: hci9: command 0x040f tx timeout
[ 965.832297][ T27] 2 locks held by syz-executor.1/12865:
[ 965.837864][ T27] 1 lock held by syz-executor.0/12927:
[ 965.857522][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[ 965.875243][ T27] 1 lock held by syz-executor.2/13166:
[ 965.880715][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[ 965.890716][ T27] 1 lock held by syz-executor.3/13190:
[ 965.897697][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0
[ 965.911303][ T27] 1 lock held by syz-executor.4/13224:
[ 965.920439][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[ 965.935870][ T27] 1 lock held by syz-executor.3/13490:
[ 965.941783][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[ 965.965219][ T27] 3 locks held by syz-executor.1/13870:
[ 965.970782][ T27] 3 locks held by syz-executor.1/13874:
[ 965.990319][ T27] 1 lock held by syz-executor.0/13877:
[ 966.001205][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[ 966.020998][ T27] 3 locks held by syz-executor.1/13900:
[ 966.034008][ T27] 3 locks held by syz-executor.1/13904:
[ 966.039571][ T27] 2 locks held by syz-executor.1/13909:
[ 966.056821][ T27] 2 locks held by syz-executor.1/13914:
[ 966.069323][ T27] 2 locks held by syz-executor.1/13918:
[ 966.086580][ T27] 2 locks held by syz-executor.1/14026:
[ 966.095824][ T27] 1 lock held by syz-executor.1/14033:
[ 966.101294][ T27] 1 lock held by syz-executor.2/14036:
[ 966.118243][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[ 966.138070][ T27] 2 locks held by syz-executor.1/14042:
[ 966.149658][ T27] 3 locks held by syz-executor.1/14146:
[ 966.161097][ T27] 3 locks held by syz-executor.1/14259:
[ 966.175051][ T27] 2 locks held by syz-executor.1/14265:
[ 966.180606][ T27] 2 locks held by syz-executor.1/14275:
12:09:36 executing program 1:
perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x2)
[ 966.198313][ T27] 1 lock held by syz-executor.4/14283:
[ 966.209690][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[ 966.229401][ T27] 2 locks held by syz-executor.1/14288:
[ 966.240900][ T27] 3 locks held by syz-executor.1/14292:
[ 966.266655][ T27]
[ 966.269655][ T27] =============================================
[ 966.269655][ T27]
[ 966.322924][ T27] NMI backtrace for cpu 0
[ 966.327272][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.149-syzkaller #0
[ 966.335253][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
[ 966.345306][ T27] Call Trace:
[ 966.348587][ T27]
[ 966.351518][ T27] dump_stack_lvl+0x1e3/0x2cb
[ 966.356274][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d
[ 966.361912][ T27] ? panic+0x84d/0x84d
[ 966.365981][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0
[ 966.371178][ T27] nmi_cpu_backtrace+0x46a/0x4a0
[ 966.376117][ T27] ? __wake_up_klogd+0xd5/0x100
[ 966.380985][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0
[ 966.387140][ T27] ? _printk+0xd1/0x111
[ 966.391344][ T27] ? panic+0x84d/0x84d
[ 966.395414][ T27] ? __wake_up_klogd+0xcc/0x100
[ 966.400263][ T27] ? panic+0x84d/0x84d
[ 966.404333][ T27] ? __rcu_read_unlock+0x92/0x100
[ 966.409367][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10
[ 966.415503][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0
[ 966.421494][ T27] watchdog+0xe72/0xeb0
[ 966.425712][ T27] kthread+0x3f6/0x4f0
[ 966.429783][ T27] ? hungtask_pm_notify+0x50/0x50
[ 966.434805][ T27] ? kthread_blkcg+0xd0/0xd0
[ 966.439397][ T27] ret_from_fork+0x1f/0x30
[ 966.443818][ T27]
[ 966.447579][ T27] Sending NMI from CPU 0 to CPUs 1:
[ 966.453045][ C1] NMI backtrace for cpu 1
[ 966.453056][ C1] CPU: 1 PID: 4228 Comm: kworker/u4:7 Not tainted 5.15.149-syzkaller #0
[ 966.453071][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
[ 966.453080][ C1] Workqueue: bat_events batadv_nc_worker
[ 966.453174][ C1] RIP: 0010:lock_release+0x5ce/0x9a0
[ 966.453190][ C1] Code: 08 48 8b 5c 24 28 49 89 dd 4c 8d b4 24 90 00 00 00 48 c7 c7 a0 27 8b 8a e8 3f 5a ba 08 b8 ff ff ff ff 65 0f c1 05 82 c5 9f 7e <83> f8 01 0f 85 94 00 00 00 4c 89 f3 48 c1 eb 03 42 80 3c 3b 00 74
[ 966.453203][ C1] RSP: 0018:ffffc9000bd97a00 EFLAGS: 00000057
[ 966.453214][ C1] RAX: 0000000000000001 RBX: 0000000000000246 RCX: ffffc9000bd97a03
[ 966.453224][ C1] RDX: 0000000000000002 RSI: ffffffff8a8b27a0 RDI: ffffffff8ad88e40
[ 966.453234][ C1] RBP: ffffc9000bd97b38 R08: dffffc0000000000 R09: fffffbfff1bc7746
[ 966.453244][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff920017b2f4c
[ 966.453254][ C1] R13: 0000000000000246 R14: ffffc9000bd97a90 R15: dffffc0000000000
[ 966.453264][ C1] FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
[ 966.453276][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 966.453286][ C1] CR2: 0000555556985788 CR3: 0000000059e65000 CR4: 00000000003506e0
[ 966.453299][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 966.453307][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 966.453315][ C1] Call Trace:
[ 966.453320][ C1]
[ 966.453324][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0
[ 966.453342][ C1] ? read_lock_is_recursive+0x10/0x10
[ 966.453357][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0
[ 966.453374][ C1] ? unknown_nmi_error+0xd0/0xd0
[ 966.453422][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10
[ 966.453437][ C1] ? nmi_handle+0xf7/0x370
[ 966.453452][ C1] ? lock_release+0x5ce/0x9a0
[ 966.453464][ C1] ? default_do_nmi+0x62/0x150
[ 966.453479][ C1] ? exc_nmi+0xab/0x120
[ 966.453491][ C1] ? end_repeat_nmi+0x16/0x31
[ 966.453509][ C1] ? lock_release+0x5ce/0x9a0
[ 966.453521][ C1] ? lock_release+0x5ce/0x9a0
[ 966.453535][ C1] ? lock_release+0x5ce/0x9a0
[ 966.453547][ C1]
[ 966.453551][ C1]
[ 966.453557][ C1] ? read_lock_is_recursive+0x10/0x10
[ 966.453570][ C1] ? batadv_nc_purge_paths+0x30e/0x3b0
[ 966.453584][ C1] ? __lock_acquire+0x1ff0/0x1ff0
[ 966.453596][ C1] ? do_raw_spin_lock+0x14a/0x370
[ 966.453611][ C1] ? __bpf_trace_softirq+0x10/0x10
[ 966.453626][ C1] ? __rwlock_init+0x140/0x140
[ 966.453641][ C1] ? batadv_nc_purge_paths+0xe8/0x3b0
[ 966.453655][ C1] ? batadv_nc_purge_paths+0x30e/0x3b0
[ 966.453669][ C1] _raw_spin_unlock_bh+0x17/0x30
[ 966.453685][ C1] ? batadv_nc_to_purge_nc_path_coding+0x120/0x120
[ 966.453700][ C1] batadv_nc_purge_paths+0x30e/0x3b0
[ 966.453719][ C1] batadv_nc_worker+0x30b/0x5b0
[ 966.453736][ C1] process_one_work+0x8a1/0x10c0
[ 966.453758][ C1] ? worker_detach_from_pool+0x260/0x260
[ 966.453774][ C1] ? _raw_spin_lock_irqsave+0x120/0x120
[ 966.453789][ C1] ? kthread_data+0x4e/0xc0
[ 966.453802][ C1] ? wq_worker_running+0x97/0x170
[ 966.453817][ C1] worker_thread+0xaca/0x1280
[ 966.453842][ C1] kthread+0x3f6/0x4f0
[ 966.453854][ C1] ? rcu_lock_release+0x20/0x20
[ 966.453868][ C1] ? kthread_blkcg+0xd0/0xd0
[ 966.453881][ C1] ret_from_fork+0x1f/0x30
[ 966.453902][ C1]
[ 966.572918][ T27] Kernel panic - not syncing: hung_task: blocked tasks
[ 966.796727][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.149-syzkaller #0
[ 966.804702][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
[ 966.814755][ T27] Call Trace:
[ 966.818026][ T27]
[ 966.820952][ T27] dump_stack_lvl+0x1e3/0x2cb
[ 966.825633][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d
[ 966.831274][ T27] ? panic+0x84d/0x84d
[ 966.835353][ T27] panic+0x318/0x84d
[ 966.839255][ T27] ? schedule_preempt_disabled+0x20/0x20
[ 966.844883][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0
[ 966.851042][ T27] ? fb_is_primary_device+0xcc/0xcc
[ 966.856242][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10
[ 966.862408][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0
[ 966.868564][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0
[ 966.874724][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0
[ 966.880883][ T27] watchdog+0xeb0/0xeb0
[ 966.885046][ T27] kthread+0x3f6/0x4f0
[ 966.889116][ T27] ? hungtask_pm_notify+0x50/0x50
[ 966.894140][ T27] ? kthread_blkcg+0xd0/0xd0
[ 966.898734][ T27] ret_from_fork+0x1f/0x30
[ 966.903159][ T27]
[ 966.906322][ T27] Kernel Offset: disabled
[ 966.910632][ T27] Rebooting in 86400 seconds..