sport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 592.432109][ T9882] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 593.525239][ T9877] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 593.567598][ T9890] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 593.582081][ T9890] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 593.692083][ T9890] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 594.106071][ T9877] team0: Port device team_slave_0 added [ 594.133683][ T9890] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 594.140636][ T9890] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 594.243327][ T9890] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 594.654342][ T9877] team0: Port device team_slave_1 added [ 596.389819][ T9877] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 596.400336][ T9877] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 596.447738][ T9877] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 596.782283][ T3560] Bluetooth: hci2: command 0x0409 tx timeout [ 596.876269][ T9882] device hsr_slave_0 entered promiscuous mode [ 597.002613][ T9882] device hsr_slave_1 entered promiscuous mode [ 597.103554][ T9882] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 597.111130][ T9882] Cannot create hsr debugfs directory [ 597.138464][ T9877] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 597.153924][ T9877] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 597.224898][ T9877] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 598.071757][ T9890] device hsr_slave_0 entered promiscuous mode [ 598.192600][ T9890] device hsr_slave_1 entered promiscuous mode [ 598.345637][ T9890] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 598.362088][ T9890] Cannot create hsr debugfs directory [ 598.491521][ T9877] device hsr_slave_0 entered promiscuous mode [ 598.551568][ T9877] device hsr_slave_1 entered promiscuous mode [ 598.643576][ T9877] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 598.653895][ T9877] Cannot create hsr debugfs directory [ 598.852409][ T6590] Bluetooth: hci2: command 0x041b tx timeout [ 599.617307][ T9885] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 600.274088][ T9885] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 600.932290][ T3518] Bluetooth: hci2: command 0x040f tx timeout [ 601.448565][ T9885] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 602.058658][ T9885] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 602.242313][ T9923] chnl_net:caif_netlink_parms(): no params data found [ 603.012376][ T3518] Bluetooth: hci2: command 0x0419 tx timeout [ 603.040937][ T9882] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 603.484716][ T9923] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.491789][ T9923] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.533375][ T9923] device bridge_slave_0 entered promiscuous mode [ 603.752895][ T9882] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 603.855515][ T9923] bridge0: port 2(bridge_slave_1) entered blocking state [ 603.882243][ T9923] bridge0: port 2(bridge_slave_1) entered disabled state [ 603.890428][ T9923] device bridge_slave_1 entered promiscuous mode [ 604.125990][ T9923] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 604.555108][ T9882] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 604.664955][ T9923] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 605.193449][ T9882] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 605.297076][ T9923] team0: Port device team_slave_0 added [ 605.316467][ T9923] team0: Port device team_slave_1 added [ 605.594169][ T9923] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 605.622287][ T9923] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 605.708862][ T9923] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 605.753511][ T9923] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 605.760472][ T9923] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 605.830511][ T9923] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 606.032017][ T9923] device hsr_slave_0 entered promiscuous mode [ 606.102518][ T9923] device hsr_slave_1 entered promiscuous mode [ 606.139578][ T9923] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 606.152089][ T9923] Cannot create hsr debugfs directory [ 606.195421][ T9890] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 606.610927][ T9890] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 606.893107][ T9890] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.153870][ T4115] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.209165][ T9890] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.263688][ T4115] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.365063][ T4115] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.462893][ T4115] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.691575][ T4115] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.792775][ T4115] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.878260][ T4115] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.973897][ T4115] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.327843][ T9890] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 608.361699][ T9890] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 608.428366][ T9890] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 608.463773][ T9890] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 608.685795][ T9890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 608.740409][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 608.749471][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 608.778245][ T9890] 8021q: adding VLAN 0 to HW filter on device team0 [ 609.043894][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 609.055482][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 609.072473][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.079537][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 609.105821][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 609.122629][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 609.131007][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.138096][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 609.158815][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 609.214073][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 609.224466][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 609.233560][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 609.243673][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 609.252386][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 609.253075][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 609.269438][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 609.278658][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 609.290888][ T9890] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 609.304521][ T9890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 609.321266][ T9885] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 609.334122][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 609.343358][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 609.351871][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 609.364437][ T9885] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 609.380855][ T9885] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 609.421382][ T9885] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 609.493672][ T9882] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 609.544337][ T9882] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 609.562256][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 609.569724][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 609.595138][ T9882] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 609.609618][ T9890] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 609.632233][ T9882] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 609.780602][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 609.796663][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 609.882223][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 609.890438][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 609.899721][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 609.907735][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 609.951750][ T9890] device veth0_vlan entered promiscuous mode [ 610.015956][ T9885] 8021q: adding VLAN 0 to HW filter on device bond0 [ 610.026886][ T9890] device veth1_vlan entered promiscuous mode [ 610.069413][ T9885] 8021q: adding VLAN 0 to HW filter on device team0 [ 610.087919][ T9882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 610.097446][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 610.105914][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 610.116225][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 610.124256][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 610.153509][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 610.181446][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 610.190442][ T3532] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.197502][ T3532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.206028][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 610.215242][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 610.223865][ T3532] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.230913][ T3532] bridge0: port 2(bridge_slave_1) entered forwarding state [ 610.238564][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 610.247409][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 610.256181][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 610.263997][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 610.271972][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 610.281629][ T9882] 8021q: adding VLAN 0 to HW filter on device team0 [ 610.301192][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 610.313839][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 610.365498][ T9890] device veth0_macvtap entered promiscuous mode [ 610.373915][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 610.381845][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 610.390758][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 610.399885][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 610.408876][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 610.417585][ T6590] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.424676][ T6590] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.433467][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 610.442007][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 610.450743][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 610.459888][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 610.468697][ T6590] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.475784][ T6590] bridge0: port 2(bridge_slave_1) entered forwarding state [ 610.483932][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 610.492415][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 610.500967][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 610.509560][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 610.517975][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 610.563497][ T9885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 610.581909][ T9890] device veth1_macvtap entered promiscuous mode [ 610.590332][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 610.599038][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 610.607614][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 610.615961][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 610.625020][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 610.636658][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 610.645348][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 610.653909][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 610.662274][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 610.670632][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 610.688118][ T9882] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 610.701255][ T9882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 610.728239][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 610.742028][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 610.750690][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 610.776132][ T9877] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 610.820013][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 610.843874][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 610.858130][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 610.869249][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 610.892543][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 610.911419][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 610.921904][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 610.933160][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 610.944849][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 610.955607][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 610.967377][ T9890] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 610.985215][ T9877] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 611.010229][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 611.030149][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 611.055213][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 611.080032][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.102412][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 611.122129][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.131946][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 611.143640][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.154791][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 611.165580][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.175858][ T9890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 611.189421][ T9890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.200318][ T9890] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 611.210447][ T9877] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 611.231412][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 611.239926][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 611.250598][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 611.258616][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 611.273374][ T9890] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 611.283517][ T9890] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 611.293332][ T9890] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 611.302021][ T9890] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 611.311782][ T9877] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 611.334199][ T9882] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 611.385251][ T9885] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 611.393674][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 611.401158][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 611.447678][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 611.459522][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 611.509094][ T9923] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 611.553796][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 611.564074][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 611.583602][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 611.602521][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 611.612540][ T9882] device veth0_vlan entered promiscuous mode [ 611.639851][ T9923] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 611.655761][ T9923] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 611.690762][ T9923] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 611.712545][ T155] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 611.715389][ T9882] device veth1_vlan entered promiscuous mode [ 611.720510][ T155] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 611.847801][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 611.871957][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 611.880791][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 611.953758][ T144] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 611.961853][ T144] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 611.971418][ T9882] device veth0_macvtap entered promiscuous mode [ 611.988740][ T9877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 611.997761][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 612.006944][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 612.015928][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 612.024522][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 612.033401][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 612.053098][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 612.061136][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 612.070436][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 612.080237][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 612.088555][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 12:03:42 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 612.098840][ T9882] device veth1_macvtap entered promiscuous mode 12:03:42 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 612.137690][ T9885] device veth0_vlan entered promiscuous mode 12:03:42 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 612.249911][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 612.258392][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 612.282757][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 612.328862][ T9877] 8021q: adding VLAN 0 to HW filter on device team0 [ 612.368573][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 12:03:42 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 612.396553][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 612.424623][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 612.455417][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 612.485374][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 612.519754][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 612.552106][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 612.585048][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 612.614284][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 12:03:42 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 612.644936][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 612.675943][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 612.703487][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 612.733930][ T9882] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 612.772770][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 612.781594][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 612.796542][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 612.809014][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 12:03:43 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 612.817839][ T3561] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.824932][ T3561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 612.860590][ T9885] device veth1_vlan entered promiscuous mode [ 612.923615][ T9923] 8021q: adding VLAN 0 to HW filter on device bond0 [ 612.930655][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 612.949038][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 12:03:43 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 612.982934][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 612.991903][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 613.032518][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 613.039592][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 613.059449][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 613.081208][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 613.091937][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 613.102390][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 613.111103][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 613.127555][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 613.138138][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 613.148841][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 613.162463][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 12:03:43 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 613.184052][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 613.202087][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 613.212900][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 613.223324][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 613.242149][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 613.252899][ T9882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 613.285000][ T9882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 613.303430][ T9882] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 613.334243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 613.344576][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 613.363349][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 613.392378][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 613.400586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 613.453166][ T9923] 8021q: adding VLAN 0 to HW filter on device team0 [ 613.461816][ T9882] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 613.502096][ T9882] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 613.510819][ T9882] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 613.535851][ T9882] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 613.583155][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 613.591727][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 613.623037][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 12:03:43 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 613.642384][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 613.672726][ T3563] bridge0: port 1(bridge_slave_0) entered blocking state [ 613.679800][ T3563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 613.692453][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 613.701110][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 613.711940][ T3563] bridge0: port 2(bridge_slave_1) entered blocking state [ 613.719048][ T3563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 613.733174][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 613.745084][ T9885] device veth0_macvtap entered promiscuous mode 12:03:44 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:44 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 614.250535][ T9885] device veth1_macvtap entered promiscuous mode [ 614.273101][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 614.281247][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 614.292866][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 614.300791][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 614.333164][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 614.343247][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 12:03:44 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 614.351717][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 614.390623][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 614.413873][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 614.435253][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 614.452911][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 614.557011][ T9923] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 614.582827][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 614.597975][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 614.632716][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 614.652112][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 614.663692][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 614.674269][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 614.692464][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 614.702576][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 614.713519][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 12:03:44 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 614.730353][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 614.764866][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 614.792249][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 614.822129][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 614.840622][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 614.851205][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 614.863884][ T9885] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 614.938318][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 614.952172][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 614.962713][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 614.975106][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 615.002836][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 615.036907][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 615.059142][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 615.082743][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 12:03:45 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 615.102103][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 615.121059][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 615.142092][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 615.164674][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 615.182196][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 615.193451][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 615.203332][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 615.213782][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 615.231173][ T9885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 615.252706][ T9885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 615.267487][ T9885] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 615.313050][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 615.321808][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:03:45 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 615.550215][ T9885] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 615.572989][ T9885] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 615.581713][ T9885] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 615.608887][ T9885] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 12:03:46 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 616.058393][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 616.070859][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 616.244096][ T155] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 616.260311][ T9923] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 616.270072][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 616.273365][ T155] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 616.285949][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 616.307097][ T9250] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 616.326953][ T9250] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 616.340563][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 616.362481][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 616.393667][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 12:03:46 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:46 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 616.550975][ T3570] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 616.559230][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 616.568764][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 616.577530][ T3570] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 12:03:46 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 616.698066][ T9923] device veth0_vlan entered promiscuous mode [ 616.767048][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 616.798169][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 12:03:46 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:46 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 616.822977][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 616.835753][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 616.855635][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 12:03:47 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:47 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:47 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), 0x0) 12:03:47 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:47 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), 0x0) 12:03:47 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:47 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), 0x0) [ 617.285501][ T9923] device veth1_vlan entered promiscuous mode 12:03:47 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 617.365385][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 617.388447][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 12:03:47 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)) 12:03:47 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 617.421736][ T9923] device veth0_macvtap entered promiscuous mode [ 617.446396][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 617.462971][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 12:03:47 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)) [ 617.544979][ T9923] device veth1_macvtap entered promiscuous mode [ 617.552965][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 617.572917][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 12:03:47 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)) 12:03:47 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:03:47 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:03:47 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:03:48 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), 0x0) 12:03:48 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 617.897588][ T3518] Bluetooth: hci0: command 0x0409 tx timeout [ 617.936482][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 618.007041][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 618.042532][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 12:03:48 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:03:48 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") [ 618.077457][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 618.112829][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 12:03:48 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") [ 618.139463][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 618.164413][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 618.194425][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 618.234316][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 12:03:48 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), 0x0) [ 618.254381][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 618.282486][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 12:03:48 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") [ 618.316066][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 618.346873][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 12:03:48 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 618.394456][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 618.413622][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 12:03:48 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") [ 618.446694][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 618.483689][ T9923] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 618.494155][T10108] chnl_net:caif_netlink_parms(): no params data found 12:03:48 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:03:48 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:48 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:03:48 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:03:48 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:03:48 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 618.832449][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 618.842741][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 618.883751][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 12:03:49 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23") [ 618.925573][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 618.954383][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 12:03:49 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 618.992080][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 619.001940][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 619.042086][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 619.051916][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 12:03:49 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23") [ 619.092084][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 619.101904][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 619.136844][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 619.162123][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 12:03:49 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") [ 619.197726][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 619.232089][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 619.264629][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 619.294400][ T9923] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 12:03:49 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") [ 619.326610][ T9923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 619.356965][ T9923] batman_adv: batadv0: Interface activated: batadv_slave_1 12:03:49 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23") [ 619.380680][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 619.392766][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:03:49 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:03:49 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cb") 12:03:49 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:03:49 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cb") 12:03:49 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cb") [ 619.806319][ T9923] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 619.825958][ T9923] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 619.835050][ T9923] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 619.844035][ T9923] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 619.982345][ T3561] Bluetooth: hci0: command 0x041b tx timeout 12:03:50 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:50 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf71") 12:03:50 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab9230", 0x66, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:50 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf71") 12:03:50 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf71") 12:03:50 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f") 12:03:50 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf71") 12:03:50 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f") 12:03:50 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f") 12:03:50 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f") 12:03:51 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f") 12:03:51 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab9230", 0x66, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:51 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f") 12:03:51 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:51 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:51 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:51 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x7054b5135884cefc) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, r1, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:51 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:51 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab9230", 0x66, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:52 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:52 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x7054b5135884cefc) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, r1, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 622.062233][ T7] Bluetooth: hci0: command 0x040f tx timeout 12:03:52 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:52 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:52 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:52 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:52 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:53 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:53 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:53 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:53 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:53 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:53 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:54 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 624.142338][ T7] Bluetooth: hci0: command 0x0419 tx timeout 12:03:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 624.222580][ T1382] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.228887][ T1382] ieee802154 phy1 wpan1: encryption failed: -22 12:03:54 executing program 0: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:54 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:55 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:55 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:55 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:55 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 625.814873][T10108] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.844118][T10108] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.872613][T10108] device bridge_slave_0 entered promiscuous mode 12:03:56 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:56 executing program 4: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:56 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:57 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:57 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 626.920023][T10108] bridge0: port 2(bridge_slave_1) entered blocking state [ 626.942638][T10108] bridge0: port 2(bridge_slave_1) entered disabled state [ 626.950934][T10108] device bridge_slave_1 entered promiscuous mode 12:03:57 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:57 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:58 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:58 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:58 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:03:58 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 628.849651][T10108] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 628.929894][T10108] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 12:04:00 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:00 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:00 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:01 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:01 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:02 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:03 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:03 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:04 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 633.855164][ T3570] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 633.869737][ T3570] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 633.927829][T10108] team0: Port device team_slave_0 added [ 633.958035][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 634.057551][T10108] team0: Port device team_slave_1 added 12:04:04 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:04 executing program 0: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:04 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 634.773598][ T144] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 634.792787][ T144] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 634.794150][T10108] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 634.823753][T10108] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 634.905260][T10108] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 635.108819][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 635.117611][T10108] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 635.127930][T10108] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 12:04:05 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 635.177528][T10108] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 12:04:05 executing program 4: syz_clone(0xb0188080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)) 12:04:07 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:07 executing program 4: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:08 executing program 4: syz_clone(0xb0188080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)) [ 638.466750][T10108] device hsr_slave_0 entered promiscuous mode 12:04:08 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 638.937497][T10108] device hsr_slave_1 entered promiscuous mode [ 639.104473][T10108] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 639.115507][T10108] Cannot create hsr debugfs directory 12:04:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r0 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, r1, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:10 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:10 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:11 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:12 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:12 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:12 executing program 4: syz_clone(0xb0188080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:13 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:13 executing program 4: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000300)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:13 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:14 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:14 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:15 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:15 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:15 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:16 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 646.695713][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0 12:04:16 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:17 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 647.217739][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 647.334807][ T4115] device bridge_slave_1 left promiscuous mode [ 647.341024][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state 12:04:17 executing program 4: syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:18 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 647.962661][ T4115] device bridge_slave_0 left promiscuous mode [ 647.968894][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state 12:04:18 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 648.425081][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 648.702265][ T1066] Bluetooth: hci2: command 0x0409 tx timeout [ 648.865558][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1 12:04:19 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:19 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0) [ 649.338748][ T4115] device bridge_slave_1 left promiscuous mode [ 649.363327][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state 12:04:19 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 649.962674][ T4115] device bridge_slave_0 left promiscuous mode [ 649.968888][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state [ 650.782342][ T8317] Bluetooth: hci2: command 0x041b tx timeout [ 651.602176][ T4115] device hsr_slave_0 left promiscuous mode [ 652.152223][ T4115] device hsr_slave_1 left promiscuous mode [ 652.662295][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 652.669756][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 652.862169][ T7] Bluetooth: hci2: command 0x040f tx timeout [ 653.034185][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 653.041616][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 653.214222][ T4115] device bridge_slave_1 left promiscuous mode [ 653.220413][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.808107][ T4115] device bridge_slave_0 left promiscuous mode [ 653.832241][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state [ 654.211844][ T4115] device hsr_slave_0 left promiscuous mode [ 654.662175][ T4115] device hsr_slave_1 left promiscuous mode [ 654.945814][ T7] Bluetooth: hci2: command 0x0419 tx timeout [ 655.142263][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 655.149725][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 655.404267][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 655.411722][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 655.644253][ T4115] device bridge_slave_1 left promiscuous mode [ 655.650450][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.157291][ T4115] device bridge_slave_0 left promiscuous mode [ 656.172212][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.472237][ T4115] device hsr_slave_0 left promiscuous mode [ 657.979980][ T4115] device hsr_slave_1 left promiscuous mode [ 658.452736][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 658.460647][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 658.694740][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 658.712133][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 658.874160][ T4115] device bridge_slave_1 left promiscuous mode [ 658.880361][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state [ 659.340223][ T4115] device bridge_slave_0 left promiscuous mode [ 659.352190][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state 12:04:30 executing program 0: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:30 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0) 12:04:30 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 660.498767][ T4115] device hsr_slave_0 left promiscuous mode [ 660.530661][ T4115] device hsr_slave_1 left promiscuous mode [ 660.547965][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 660.564684][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 660.599621][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 660.620833][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1 12:04:30 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0) 12:04:30 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(0x0, 0x0, 0x2, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0) [ 660.962991][ T4115] device bridge_slave_1 left promiscuous mode [ 660.969182][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state [ 661.282901][ T4115] device bridge_slave_0 left promiscuous mode [ 661.289106][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state 12:04:31 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:31 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:32 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 662.316369][ T4115] device hsr_slave_0 left promiscuous mode 12:04:32 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 662.783835][ T4115] device hsr_slave_1 left promiscuous mode 12:04:33 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 663.393152][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 663.400630][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 663.422224][ T7] Bluetooth: hci1: command 0x0409 tx timeout 12:04:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 663.834318][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 663.841765][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1 12:04:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 664.175441][ T4115] device bridge_slave_1 left promiscuous mode [ 664.181642][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state 12:04:34 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 664.752616][ T4115] device bridge_slave_0 left promiscuous mode [ 664.758820][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state 12:04:35 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:35 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 665.492288][ T3518] Bluetooth: hci1: command 0x041b tx timeout 12:04:36 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 666.315687][ T4115] device veth1_macvtap left promiscuous mode [ 666.321743][ T4115] device veth0_macvtap left promiscuous mode [ 666.342275][ T4115] device veth1_vlan left promiscuous mode [ 666.348081][ T4115] device veth0_vlan left promiscuous mode 12:04:36 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:37 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 667.572286][ T3518] Bluetooth: hci1: command 0x040f tx timeout 12:04:37 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) 12:04:38 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:38 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) [ 668.491198][ T4115] device veth1_macvtap left promiscuous mode [ 668.500498][ T4115] device veth0_macvtap left promiscuous mode [ 668.522252][ T4115] device veth1_vlan left promiscuous mode [ 668.528062][ T4115] device veth0_vlan left promiscuous mode 12:04:39 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) 12:04:39 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 669.655988][ T3562] Bluetooth: hci1: command 0x0419 tx timeout [ 669.763004][ T4115] device veth1_macvtap left promiscuous mode [ 669.769701][ T4115] device veth0_macvtap left promiscuous mode [ 669.784743][ T4115] device veth1_vlan left promiscuous mode [ 669.792534][ T4115] device veth0_vlan left promiscuous mode 12:04:40 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) [ 671.420899][ T4115] device veth1_macvtap left promiscuous mode [ 671.430095][ T4115] device veth0_macvtap left promiscuous mode [ 671.446635][ T4115] device veth1_vlan left promiscuous mode [ 671.462001][ T4115] device veth0_vlan left promiscuous mode 12:04:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) 12:04:41 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:42 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) 12:04:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) 12:04:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:04:43 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 673.462966][ T4115] device veth1_macvtap left promiscuous mode [ 673.469053][ T4115] device veth0_macvtap left promiscuous mode [ 673.522276][ T4115] device veth1_vlan left promiscuous mode [ 673.528098][ T4115] device veth0_vlan left promiscuous mode 12:04:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:04:44 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:04:45 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:04:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) 12:04:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x20) 12:04:46 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:04:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20) 12:04:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20) 12:04:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20) 12:04:48 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:04:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20) syz_clone(0xb0188080, 0x0, 0x0, 0x0, 0x0, 0x0) 12:04:49 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:49 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:49 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:04:50 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:04:50 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:51 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:04:51 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:04:51 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:52 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:04:52 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:04:53 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:53 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:04:54 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:54 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) [ 684.132278][ T3562] Bluetooth: hci3: command 0x0409 tx timeout 12:04:54 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:54 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:04:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:04:55 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 685.653868][ T1382] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.660174][ T1382] ieee802154 phy1 wpan1: encryption failed: -22 12:04:56 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) [ 686.212238][ T1066] Bluetooth: hci3: command 0x041b tx timeout 12:04:56 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) 12:04:57 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:57 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) [ 687.742255][ T7] Bluetooth: hci5: command 0x0406 tx timeout 12:04:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) [ 688.302234][ T8317] Bluetooth: hci3: command 0x040f tx timeout 12:04:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) 12:04:58 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:04:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) 12:04:59 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:05:00 executing program 1: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:00 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 690.382201][ T7] Bluetooth: hci3: command 0x0419 tx timeout 12:05:01 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:02 executing program 1: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:02 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 692.852187][ T1066] Bluetooth: hci6: command 0x0406 tx timeout 12:05:03 executing program 1: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:04 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:04 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:04 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:05 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:06 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:06 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:05:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:05:06 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:05:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:05:08 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) 12:05:09 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) 12:05:09 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) 12:05:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) 12:05:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) 12:05:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) 12:05:12 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:12 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:13 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:13 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:13 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20) 12:05:13 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20) [ 703.734343][ T4115] team0 (unregistering): Port device team_slave_1 removed [ 703.775072][ T4115] team0 (unregistering): Port device team_slave_0 removed [ 703.803987][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 703.841790][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 12:05:14 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20) [ 704.036713][ T4115] bond0 (unregistering): Released all slaves 12:05:14 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20) [ 704.284909][ T4115] team0 (unregistering): Port device team_slave_1 removed [ 704.313391][ T4115] team0 (unregistering): Port device team_slave_0 removed 12:05:14 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20) [ 704.338257][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 12:05:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20) [ 704.493159][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 12:05:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:05:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 704.774097][ T4115] bond0 (unregistering): Released all slaves 12:05:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:05:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20) 12:05:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20) 12:05:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0}, 0x20) [ 705.353973][ T4115] team0 (unregistering): Port device team_slave_1 removed 12:05:15 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000}, 0x20) [ 705.564149][ T4115] team0 (unregistering): Port device team_slave_0 removed [ 705.606274][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 705.650199][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 12:05:15 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 705.918567][ T4115] bond0 (unregistering): Released all slaves 12:05:16 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:16 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 706.394688][ T4115] team0 (unregistering): Port device team_slave_1 removed [ 706.422557][ T4115] team0 (unregistering): Port device team_slave_0 removed 12:05:16 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 706.450521][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 706.622693][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 12:05:16 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) 12:05:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r0 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 707.112783][ T4115] bond0 (unregistering): Released all slaves [ 708.863852][ T4115] team0 (unregistering): Port device team_slave_1 removed [ 708.989340][ T4115] team0 (unregistering): Port device team_slave_0 removed [ 709.232525][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 709.527999][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 709.963274][ T4115] bond0 (unregistering): Released all slaves [ 711.607953][ T4115] team0 (unregistering): Port device team_slave_1 removed [ 711.993509][ T4115] team0 (unregistering): Port device team_slave_0 removed [ 712.177265][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 712.238295][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 713.635686][ T4115] bond0 (unregistering): Released all slaves [ 714.367585][ T4115] team0 (unregistering): Port device team_slave_1 removed [ 714.402943][ T4115] team0 (unregistering): Port device team_slave_0 removed [ 714.552476][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 714.622262][ T7] Bluetooth: hci4: command 0x0409 tx timeout [ 714.724946][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 715.062870][ T4115] bond0 (unregistering): Released all slaves [ 715.857913][T10742] chnl_net:caif_netlink_parms(): no params data found 12:05:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 716.077077][T10927] chnl_net:caif_netlink_parms(): no params data found 12:05:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) 12:05:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 716.447819][T10927] bridge0: port 1(bridge_slave_0) entered blocking state [ 716.464403][T10927] bridge0: port 1(bridge_slave_0) entered disabled state [ 716.506098][T10927] device bridge_slave_0 entered promiscuous mode [ 716.549821][T11136] chnl_net:caif_netlink_parms(): no params data found [ 716.574979][T10927] bridge0: port 2(bridge_slave_1) entered blocking state [ 716.598507][T10927] bridge0: port 2(bridge_slave_1) entered disabled state [ 716.612717][T10927] device bridge_slave_1 entered promiscuous mode 12:05:26 executing program 4: r0 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 716.642563][T10742] bridge0: port 1(bridge_slave_0) entered blocking state [ 716.649712][T10742] bridge0: port 1(bridge_slave_0) entered disabled state [ 716.683901][T10742] device bridge_slave_0 entered promiscuous mode [ 716.692393][ T3563] Bluetooth: hci4: command 0x041b tx timeout 12:05:26 executing program 4: r0 = syz_clone(0x0, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 716.743406][T10742] bridge0: port 2(bridge_slave_1) entered blocking state [ 716.750473][T10742] bridge0: port 2(bridge_slave_1) entered disabled state [ 716.783176][T10742] device bridge_slave_1 entered promiscuous mode [ 716.836021][T10927] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 716.847992][T10927] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 716.867609][T10742] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 716.945139][T10742] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 717.022810][T10927] team0: Port device team_slave_0 added [ 717.041077][T11136] bridge0: port 1(bridge_slave_0) entered blocking state [ 717.053972][T11136] bridge0: port 1(bridge_slave_0) entered disabled state [ 717.079878][T11136] device bridge_slave_0 entered promiscuous mode 12:05:27 executing program 4: r0 = syz_clone(0x0, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 717.131442][T10927] team0: Port device team_slave_1 added [ 717.138293][T11136] bridge0: port 2(bridge_slave_1) entered blocking state [ 717.152226][T11136] bridge0: port 2(bridge_slave_1) entered disabled state [ 717.160420][T11136] device bridge_slave_1 entered promiscuous mode [ 717.205721][T10742] team0: Port device team_slave_0 added [ 717.283897][T10742] team0: Port device team_slave_1 added [ 717.320192][T10927] batman_adv: batadv0: Adding interface: batadv_slave_0 12:05:27 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 717.331254][T10927] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 717.429324][T10927] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 717.444162][T11136] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 717.467201][T11136] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 717.494581][T10927] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 717.501552][T10927] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 12:05:27 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 717.552129][T10927] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 717.633860][T11136] team0: Port device team_slave_0 added 12:05:27 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 717.702386][T10742] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 717.709345][T10742] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 717.753764][T10742] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 717.767471][T10742] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 717.774537][T10742] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 717.814548][T10742] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 717.832255][T11136] team0: Port device team_slave_1 added 12:05:28 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 717.856906][T10927] device hsr_slave_0 entered promiscuous mode [ 717.873029][T10927] device hsr_slave_1 entered promiscuous mode [ 717.879689][T10927] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 717.887541][T10927] Cannot create hsr debugfs directory 12:05:28 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 717.970112][T10742] device hsr_slave_0 entered promiscuous mode [ 717.980111][T10742] device hsr_slave_1 entered promiscuous mode [ 717.992085][T10742] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 717.999643][T10742] Cannot create hsr debugfs directory 12:05:28 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 718.089924][T11136] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 718.102121][T11136] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 718.152094][T11136] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 718.176278][T11136] batman_adv: batadv0: Adding interface: batadv_slave_1 12:05:28 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 718.192083][T11136] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 718.234469][T11136] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 12:05:28 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 718.419018][T11136] device hsr_slave_0 entered promiscuous mode [ 718.440363][T11136] device hsr_slave_1 entered promiscuous mode [ 718.466569][T11136] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 718.482465][T11136] Cannot create hsr debugfs directory 12:05:28 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) 12:05:28 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 718.772443][ T1069] Bluetooth: hci4: command 0x040f tx timeout 12:05:29 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) [ 718.830408][T11171] chnl_net:caif_netlink_parms(): no params data found 12:05:29 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) [ 719.043217][T11171] bridge0: port 1(bridge_slave_0) entered blocking state [ 719.062401][T11171] bridge0: port 1(bridge_slave_0) entered disabled state [ 719.072586][T11171] device bridge_slave_0 entered promiscuous mode 12:05:29 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 719.122389][T11171] bridge0: port 2(bridge_slave_1) entered blocking state [ 719.144594][T11171] bridge0: port 2(bridge_slave_1) entered disabled state [ 719.162987][T11171] device bridge_slave_1 entered promiscuous mode 12:05:29 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 719.207143][T10742] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 719.318994][T10742] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 719.342417][ T1066] Bluetooth: hci0: command 0x0409 tx timeout [ 719.356508][T11171] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 12:05:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 719.368030][T11171] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 719.439372][T11171] team0: Port device team_slave_0 added [ 719.448471][T11171] team0: Port device team_slave_1 added 12:05:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 719.517799][T11171] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 719.532132][T11171] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 719.572572][T11171] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 719.617632][T10742] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 12:05:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 719.712908][T11171] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 719.719864][T11171] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 719.768222][T11171] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 12:05:29 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) 12:05:30 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 719.819868][T10742] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 12:05:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) [ 719.947161][T11171] device hsr_slave_0 entered promiscuous mode [ 719.971373][T11171] device hsr_slave_1 entered promiscuous mode [ 719.993026][T11171] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 720.012133][T11171] Cannot create hsr debugfs directory 12:05:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x20) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 720.067632][T11136] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 12:05:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 720.257481][T11136] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 12:05:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 720.389706][T11136] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 12:05:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_clone(0xb0188080, 0x0, 0x0, 0x0, 0x0, 0x0) [ 720.526631][T11136] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 12:05:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 720.759120][T10927] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 720.775020][T10927] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 720.794733][T10927] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 720.832968][T10927] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 720.862368][ T1066] Bluetooth: hci4: command 0x0419 tx timeout [ 720.925480][T10742] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 720.965098][T10742] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 720.992789][T11171] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 721.035136][T10742] netdevsim netdevsim0 netdevsim2: renamed from eth2 12:05:31 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 721.155261][T10927] 8021q: adding VLAN 0 to HW filter on device bond0 [ 721.183019][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 721.190748][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 721.235366][T10927] 8021q: adding VLAN 0 to HW filter on device team0 [ 721.270968][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 721.290370][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 721.314911][ T3532] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.321980][ T3532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.412242][ T8316] Bluetooth: hci0: command 0x041b tx timeout 12:05:31 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 721.569968][T11171] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 721.637512][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 721.652629][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 721.661217][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 721.702519][ T8313] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.709587][ T8313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 721.732585][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 721.741567][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 721.912631][T11171] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 12:05:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001bc0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001f40), 0x0, 0x0) [ 722.022483][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 722.031509][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 722.061876][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 722.110984][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 722.132859][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 722.141237][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 722.160497][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 722.171127][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 722.189000][ T3518] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 722.204366][T10927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 722.239005][T11171] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 722.473178][T11136] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 722.525190][T10927] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 722.564381][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 12:05:32 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 722.571838][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 722.591679][T11136] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 722.615795][T11136] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 722.791544][T11171] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 722.814478][T11136] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 722.834694][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 722.844516][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 722.871846][T10927] device veth0_vlan entered promiscuous mode [ 722.879848][T11171] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 722.904264][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 722.913976][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 722.926935][T10927] device veth1_vlan entered promiscuous mode [ 722.935810][T11171] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 722.977462][T11171] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 723.029776][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 723.047924][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 723.056025][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 723.115832][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 723.126162][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 723.143846][T10927] device veth0_macvtap entered promiscuous mode [ 723.189825][T10927] device veth1_macvtap entered promiscuous mode [ 723.226596][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 12:05:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x0, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 723.242374][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 723.253155][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 723.272260][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 723.286636][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 723.300257][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 723.310663][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 723.332965][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 723.353392][T10927] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 723.394627][T11136] 8021q: adding VLAN 0 to HW filter on device bond0 [ 723.415060][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 723.433209][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 723.441201][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 723.477081][ T6590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 723.492250][ T7] Bluetooth: hci0: command 0x040f tx timeout [ 723.494904][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 723.511464][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 723.532716][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 723.552640][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 723.563109][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 723.585090][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 723.604745][T10927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 723.619364][T10927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 723.656843][T10927] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 723.705624][T11136] 8021q: adding VLAN 0 to HW filter on device team0 [ 723.729269][T11284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 723.742860][T11284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 723.751532][T11284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 723.759367][T11284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 723.769807][T10927] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.780591][T10927] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.790236][T10927] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.799467][T10927] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 12:05:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000001f40), 0x20402, 0x0) [ 723.842237][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 723.852899][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 723.892735][ T3561] bridge0: port 1(bridge_slave_0) entered blocking state [ 723.899811][ T3561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 723.923484][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 723.964790][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 723.983053][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 723.992801][ T8313] bridge0: port 2(bridge_slave_1) entered blocking state [ 723.999869][ T8313] bridge0: port 2(bridge_slave_1) entered forwarding state 12:05:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001f40), 0x20402, 0x0) [ 724.060920][T11171] 8021q: adding VLAN 0 to HW filter on device bond0 [ 724.089184][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 724.111405][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 724.133231][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 724.142731][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 724.151173][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 724.173322][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 724.181784][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 724.195384][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 724.243179][T11171] 8021q: adding VLAN 0 to HW filter on device team0 [ 724.254587][T11136] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 724.276148][T11136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 724.308877][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 724.332825][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 724.351319][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 724.382856][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 724.402520][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 724.546655][ T144] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 724.559386][ T144] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 724.573800][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 12:05:34 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 724.592661][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 724.601233][ T21] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.608336][ T21] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.677718][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 724.693369][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 724.701761][ T21] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.708866][ T21] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.730268][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 724.815951][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 724.829525][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 724.873169][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 724.881913][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 724.913535][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 724.933040][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 724.941736][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 12:05:35 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 724.961945][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 724.971856][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 724.996125][T11171] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 725.014824][T11171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 725.042771][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 725.062480][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 725.344479][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 725.353047][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 725.361413][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 12:05:35 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 725.402874][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 725.426939][T11136] 8021q: adding VLAN 0 to HW filter on device batadv0 12:05:35 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:35 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:35 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 725.582128][ T3532] Bluetooth: hci0: command 0x0419 tx timeout [ 725.652308][ T6590] Bluetooth: hci1: command 0x0409 tx timeout 12:05:35 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:36 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:36 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:36 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:36 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:36 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:37 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:37 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) 12:05:37 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:37 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 727.732685][ T6590] Bluetooth: hci1: command 0x041b tx timeout 12:05:38 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:38 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) 12:05:38 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x1d, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 728.512433][T11284] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 728.519955][T11284] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 12:05:38 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) 12:05:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x1d, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x1d, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:39 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) [ 729.812289][ T25] Bluetooth: hci1: command 0x040f tx timeout 12:05:40 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:40 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, 0x0, 0x2, r0, 0x7054b5135884cefc) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) 12:05:40 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) 12:05:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 731.892137][ T25] Bluetooth: hci1: command 0x0419 tx timeout 12:05:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) 12:05:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 732.294805][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 732.303617][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 12:05:42 executing program 4: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) [ 733.119125][T11136] device veth0_vlan entered promiscuous mode 12:05:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 734.217470][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 734.226176][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 734.295631][T11136] device veth1_vlan entered promiscuous mode [ 734.318331][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 734.334510][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 734.362457][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 734.369961][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 734.416822][T11171] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 734.432956][T11282] chnl_net:caif_netlink_parms(): no params data found 12:05:44 executing program 4: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) 12:05:45 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 735.362430][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 735.371165][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 735.394022][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 735.422724][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 12:05:45 executing program 4: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) 12:05:46 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:46 executing program 4: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 736.310930][T11171] device veth0_vlan entered promiscuous mode [ 736.356649][T11136] device veth0_macvtap entered promiscuous mode [ 736.414988][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 736.442766][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 736.451077][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 12:05:46 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:47 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:47 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 738.107590][T11171] device veth1_vlan entered promiscuous mode [ 738.155611][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 738.172735][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 738.200220][T11136] device veth1_macvtap entered promiscuous mode 12:05:48 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:49 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:49 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 740.065766][T11282] bridge0: port 1(bridge_slave_0) entered blocking state [ 740.092184][T11282] bridge0: port 1(bridge_slave_0) entered disabled state [ 740.102284][T11282] device bridge_slave_0 entered promiscuous mode 12:05:50 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:50 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 740.348370][T11282] bridge0: port 2(bridge_slave_1) entered blocking state [ 740.361439][T11282] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.393521][T11282] device bridge_slave_1 entered promiscuous mode [ 740.407757][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 740.462185][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 740.493032][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 740.512074][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 740.521889][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 740.542081][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 740.551909][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 740.576212][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 740.602098][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 740.613577][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 740.633582][T11136] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 740.713993][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 740.732795][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 740.741522][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 740.773084][ T3532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 740.785493][T11171] device veth0_macvtap entered promiscuous mode [ 740.821277][T11282] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 740.848577][T11282] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 740.873353][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 740.902141][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 740.911958][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 740.953877][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 740.972174][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 740.999809][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 741.022083][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 741.073980][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 741.091246][T11136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 741.111450][T11136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 741.128386][T11136] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 741.145882][T11171] device veth1_macvtap entered promiscuous mode 12:05:51 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:51 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 742.368045][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 742.385201][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 12:05:52 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:52 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:53 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:53 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 743.035231][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 743.052829][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 743.085285][T11136] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 743.102118][T11136] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 743.110820][T11136] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 743.142838][T11136] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 743.201332][T11282] team0: Port device team_slave_0 added [ 743.215950][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 743.242432][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 743.272744][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 743.292177][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 743.314360][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 743.340334][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 743.363233][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 743.392115][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 743.401945][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 743.431203][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 743.451632][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 743.476593][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 743.502344][T11171] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 743.519302][T11282] team0: Port device team_slave_1 added [ 743.528571][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 743.552823][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 12:05:53 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x0, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 744.017163][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 744.027661][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 744.070247][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 744.097746][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 744.121201][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 744.146035][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 744.171520][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 744.200255][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 744.225499][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 744.250702][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 744.277828][T11171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 744.304399][T11171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 12:05:54 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 744.331538][T11171] batman_adv: batadv0: Interface activated: batadv_slave_1 12:05:54 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x0, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 744.376282][T11282] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 744.388740][T11282] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 744.478861][T11282] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 744.728300][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 744.749832][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:05:54 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x0, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 744.775742][T11171] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 744.810927][T11171] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 744.832093][T11171] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 744.840794][T11171] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 12:05:55 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 744.873295][T11282] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 744.880939][T11282] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 744.992079][T11282] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 12:05:55 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:55 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 745.344273][T11282] device hsr_slave_0 entered promiscuous mode [ 745.363086][T11282] device hsr_slave_1 entered promiscuous mode [ 745.379435][T11282] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 745.423982][T11282] Cannot create hsr debugfs directory [ 745.452591][ T4228] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 745.460539][ T4228] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 745.532789][ T153] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 745.540765][ T153] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 745.613932][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 745.813602][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 12:05:56 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:56 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:56 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 745.855381][ T4228] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 745.877601][ T4228] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 12:05:56 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:56 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:56 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x28, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:56 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:56 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:56 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800)="8b", 0x1, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:57 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x0, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:57 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) [ 747.122472][ T1382] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.128780][ T1382] ieee802154 phy1 wpan1: encryption failed: -22 12:05:57 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800)="8b", 0x1, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:57 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:05:58 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x0, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:58 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:58 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:05:58 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x0, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:58 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) [ 749.056586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 12:05:59 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 749.506892][ T4228] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 749.543161][ T4228] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 12:05:59 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 749.556363][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 12:05:59 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, 0x0, 0x29, 0x0, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:05:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:05:59 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:00 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:00 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:00 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:00 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, 0x0, 0x29, 0x0, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:00 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:01 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:01 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:01 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:01 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, 0x0, 0x29, 0x0, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:02 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:02 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:02 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:03 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:03 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:03 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:04 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:04 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:04 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:05 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:05 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:06 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:06 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:06 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, 0x0) 12:06:06 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:06 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:07 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:07 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, 0x0) 12:06:07 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:09 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:09 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:09 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, 0x0) 12:06:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:10 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:10 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)) 12:06:10 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:11 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:11 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)) 12:06:11 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:12 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:12 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:13 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)) 12:06:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:15 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8b", 0x1, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:15 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:16 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:06:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:16 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8b", 0x1, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:17 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:06:17 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:18 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8b", 0x1, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:18 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:18 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:06:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:19 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d", 0x23, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) [ 770.316714][T11282] netdevsim netdevsim0 netdevsim0: renamed from eth0 12:06:20 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:06:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:20 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) [ 770.867215][T11282] netdevsim netdevsim0 netdevsim1: renamed from eth1 12:06:21 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d", 0x23, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 771.410865][T11282] netdevsim netdevsim0 netdevsim2: renamed from eth2 12:06:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) [ 772.144598][T11282] netdevsim netdevsim0 netdevsim3: renamed from eth3 12:06:22 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:22 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d", 0x23, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:23 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:06:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) [ 774.004243][T11282] 8021q: adding VLAN 0 to HW filter on device bond0 [ 774.048788][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 774.057863][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 774.116767][T11282] 8021q: adding VLAN 0 to HW filter on device team0 [ 774.163019][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 774.173276][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 774.181649][ T1069] bridge0: port 1(bridge_slave_0) entered blocking state [ 774.188770][ T1069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 774.292753][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 774.300735][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 774.330944][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 12:06:24 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:24 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") [ 774.354741][ T21] bridge0: port 2(bridge_slave_1) entered blocking state [ 774.361811][ T21] bridge0: port 2(bridge_slave_1) entered forwarding state 12:06:24 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) [ 774.402883][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 774.430010][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 774.445133][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 774.484121][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 774.569612][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 774.583837][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 774.603131][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 774.611603][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 774.692935][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 774.701228][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 774.743027][ T1069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 774.764923][T11282] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 12:06:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) [ 775.105581][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 775.113062][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 775.130473][T11282] 8021q: adding VLAN 0 to HW filter on device batadv0 12:06:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) [ 775.224667][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 775.233533][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 775.292715][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 775.300935][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 775.346252][T11282] device veth0_vlan entered promiscuous mode [ 775.360612][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 775.369525][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 775.403330][T11282] device veth1_vlan entered promiscuous mode [ 775.479183][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 775.487509][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 775.532855][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 775.541467][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 775.603951][T11282] device veth0_macvtap entered promiscuous mode [ 775.641542][T11282] device veth1_macvtap entered promiscuous mode [ 775.706212][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 775.742638][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 775.776721][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 775.842219][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 775.872149][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 775.908186][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 775.952951][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 776.002491][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.033344][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 12:06:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) [ 776.075267][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.138937][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 776.171522][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.212200][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 776.246651][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 776.294727][T11282] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 776.305258][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 776.316644][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 776.335051][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 776.368570][ T8313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 12:06:26 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:26 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:06:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:27 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:06:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:27 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:27 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:28 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d", 0x3c, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:29 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:06:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:29 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:29 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) 12:06:31 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23") 12:06:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) [ 781.400414][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 781.436962][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.472080][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 781.515553][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.540194][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 781.572070][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.594990][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 12:06:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) [ 781.632182][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.680523][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 781.739066][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.782080][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 781.823692][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.864411][T11282] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 781.902417][T11282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 781.936908][T11282] batman_adv: batadv0: Interface activated: batadv_slave_1 12:06:32 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 781.993172][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 782.001858][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 782.045605][T11282] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.090760][T11282] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.103470][T11282] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.153017][T11282] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 12:06:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) 12:06:32 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:32 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23") 12:06:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) 12:06:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) 12:06:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:06:33 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23") 12:06:33 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:06:33 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:33 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:06:34 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:06:34 executing program 4: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d", 0x3c, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:34 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:06:34 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b", 0x44, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:34 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:06:35 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:06:35 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:06:35 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b", 0x38, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:35 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:06:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) 12:06:36 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab9230", 0x66, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:36 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:06:36 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:06:36 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b", 0x38, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:37 executing program 4: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:06:37 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:06:37 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:38 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b", 0x38, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:38 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab9230", 0x66, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:38 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:39 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893") 12:06:39 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, 0x0, 0x0, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:40 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab9230", 0x66, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:40 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) 12:06:40 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893") 12:06:41 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) [ 792.052356][T11543] Bluetooth: hci1: command 0x0409 tx timeout 12:06:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:42 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893") 12:06:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) 12:06:43 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:43 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) 12:06:43 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f") 12:06:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:43 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 794.132740][T11547] Bluetooth: hci1: command 0x041b tx timeout 12:06:44 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 12:06:44 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 794.867200][T12407] chnl_net:caif_netlink_parms(): no params data found 12:06:45 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 12:06:45 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f") [ 795.313454][T12407] bridge0: port 1(bridge_slave_0) entered blocking state [ 795.333112][T12407] bridge0: port 1(bridge_slave_0) entered disabled state [ 795.414302][T12407] device bridge_slave_0 entered promiscuous mode [ 795.641782][T12407] bridge0: port 2(bridge_slave_1) entered blocking state [ 795.692151][T12407] bridge0: port 2(bridge_slave_1) entered disabled state [ 795.726059][T12407] device bridge_slave_1 entered promiscuous mode 12:06:45 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) 12:06:46 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f") [ 796.005625][T12407] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 796.065315][T12407] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 796.212461][ T3563] Bluetooth: hci1: command 0x040f tx timeout [ 796.287080][T12407] team0: Port device team_slave_0 added [ 796.305995][T12407] team0: Port device team_slave_1 added [ 796.504162][T12407] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 796.532084][T12407] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 796.642260][T12407] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 12:06:47 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b51", 0x77, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 796.842894][T12407] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 796.849862][T12407] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 796.954269][T12407] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 12:06:47 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:48 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f") [ 798.293135][T11543] Bluetooth: hci1: command 0x0419 tx timeout 12:06:49 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:49 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:06:49 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 799.290456][T12407] device hsr_slave_0 entered promiscuous mode [ 799.335346][T12407] device hsr_slave_1 entered promiscuous mode [ 799.442303][T12407] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 799.449886][T12407] Cannot create hsr debugfs directory 12:06:51 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:51 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:06:52 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:52 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={0x0, &(0x7f0000000780)=""/4096, 0x0, 0x1000, 0x0, 0x8}, 0x20) syz_clone(0xb0188080, &(0x7f0000001800), 0x0, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:06:52 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:53 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 12:06:53 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:54 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 804.854853][T12407] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 805.492300][T11547] Bluetooth: hci3: command 0x0406 tx timeout 12:06:55 executing program 2: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 12:06:55 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:55 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:56 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 806.774528][ T4115] device hsr_slave_0 left promiscuous mode 12:06:57 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 807.407889][ T4115] device hsr_slave_1 left promiscuous mode 12:06:57 executing program 2: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:06:57 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 808.152997][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 808.533769][ T1382] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.540072][ T1382] ieee802154 phy1 wpan1: encryption failed: -22 [ 808.944654][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 809.466905][ T4115] device bridge_slave_1 left promiscuous mode [ 809.473165][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state 12:06:59 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:00 executing program 2: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:00 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 810.680619][ T4115] device bridge_slave_0 left promiscuous mode [ 810.689067][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state 12:07:00 executing program 2: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:00 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 810.728893][ T4115] device hsr_slave_0 left promiscuous mode [ 810.746116][ T4115] device hsr_slave_1 left promiscuous mode [ 810.758384][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 810.770406][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 810.814294][ T4115] device bridge_slave_1 left promiscuous mode [ 810.820494][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state [ 811.686230][ T4115] device bridge_slave_0 left promiscuous mode [ 811.699037][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state 12:07:02 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 813.117172][ T4115] device hsr_slave_0 left promiscuous mode 12:07:03 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:03 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 814.355346][ T4115] device hsr_slave_1 left promiscuous mode [ 814.908868][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 814.932516][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0 12:07:05 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 815.505735][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 815.526913][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 815.801354][ T4115] device bridge_slave_1 left promiscuous mode [ 815.810048][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state [ 815.828051][ T4115] device bridge_slave_0 left promiscuous mode [ 815.840114][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state [ 815.864705][ T4115] device hsr_slave_0 left promiscuous mode [ 817.112455][ T4115] device hsr_slave_1 left promiscuous mode [ 818.280939][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 818.288558][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 819.321702][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 819.360867][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 820.025181][ T4115] device bridge_slave_1 left promiscuous mode [ 820.031390][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state [ 821.464146][ T4115] device bridge_slave_0 left promiscuous mode [ 821.470371][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.132431][ T4115] device hsr_slave_0 left promiscuous mode 12:07:16 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0}, 0x10) 12:07:16 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:16 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:16 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 825.934023][ T4115] device hsr_slave_1 left promiscuous mode [ 825.975332][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 825.985857][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 826.001632][ T4115] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 826.018624][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 826.032241][ T4115] device bridge_slave_1 left promiscuous mode [ 826.041917][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.054473][ T4115] device bridge_slave_0 left promiscuous mode [ 826.064164][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state [ 826.493688][ T4115] device hsr_slave_0 left promiscuous mode 12:07:16 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:17 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 827.430309][ T4115] device hsr_slave_1 left promiscuous mode 12:07:17 executing program 2: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:18 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:18 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, 0x0) [ 828.794304][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_0 12:07:19 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 829.407853][ T4115] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 829.492561][ T8313] Bluetooth: hci2: command 0x0409 tx timeout 12:07:20 executing program 2: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 830.034969][ T4115] device bridge_slave_1 left promiscuous mode [ 830.041178][ T4115] bridge0: port 2(bridge_slave_1) entered disabled state 12:07:21 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, 0x0) [ 831.075052][ T4115] device bridge_slave_0 left promiscuous mode [ 831.085035][ T4115] bridge0: port 1(bridge_slave_0) entered disabled state 12:07:21 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:21 executing program 2: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, 0x0) [ 831.583823][ T3563] Bluetooth: hci2: command 0x041b tx timeout 12:07:23 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, 0x0) 12:07:23 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:23 executing program 2: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, 0x0) [ 833.652256][ T3563] Bluetooth: hci2: command 0x040f tx timeout [ 833.802462][ T4115] device veth1_macvtap left promiscuous mode [ 833.808565][ T4115] device veth0_macvtap left promiscuous mode [ 833.829569][ T4115] device veth1_vlan left promiscuous mode [ 833.852985][ T4115] device veth0_vlan left promiscuous mode 12:07:24 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:25 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)) 12:07:25 executing program 2: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, 0x0) 12:07:25 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 835.732330][ T21] Bluetooth: hci2: command 0x0419 tx timeout 12:07:26 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)) [ 836.212307][ T21] Bluetooth: hci4: command 0x0406 tx timeout 12:07:26 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:27 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, 0x0, &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 837.610014][ T4115] device veth1_macvtap left promiscuous mode [ 837.628013][ T4115] device veth0_macvtap left promiscuous mode [ 837.639527][ T4115] device veth1_vlan left promiscuous mode 12:07:27 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 837.675792][ T4115] device veth0_vlan left promiscuous mode 12:07:27 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)) 12:07:28 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0) 12:07:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:29 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:07:30 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0) 12:07:30 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:31 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:07:31 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0) [ 841.332568][T11547] Bluetooth: hci0: command 0x0406 tx timeout [ 841.880516][T12794] cgroup: fork rejected by pids controller in /syz2 12:07:32 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") [ 842.602422][ T4115] device veth1_macvtap left promiscuous mode [ 842.608528][ T4115] device veth0_macvtap left promiscuous mode [ 842.632328][ T4115] device veth1_vlan left promiscuous mode [ 842.638140][ T4115] device veth0_vlan left promiscuous mode 12:07:32 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)) 12:07:33 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:07:34 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)) 12:07:34 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:07:34 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)) 12:07:35 executing program 2: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:07:36 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:07:36 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:07:36 executing program 2: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:07:37 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:07:38 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0) 12:07:38 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:07:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935") 12:07:39 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:07:39 executing program 2: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:07:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:07:40 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:07:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:07:41 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:07:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:07:44 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23") 12:07:44 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:07:45 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23") 12:07:46 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:07:46 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23") [ 858.132260][ T21] Bluetooth: hci4: command 0x0409 tx timeout 12:07:48 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:07:49 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") 12:07:49 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") [ 860.212274][ T1069] Bluetooth: hci4: command 0x041b tx timeout 12:07:50 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23") 12:07:51 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23") [ 862.292226][ T21] Bluetooth: hci4: command 0x040f tx timeout 12:07:52 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:07:53 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893") 12:07:54 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23") [ 864.372388][T11547] Bluetooth: hci4: command 0x0419 tx timeout [ 864.458890][ T4115] team0 (unregistering): Port device team_slave_1 removed [ 864.535751][ T4115] team0 (unregistering): Port device team_slave_0 removed [ 864.558768][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 864.592913][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 12:07:54 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:07:55 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:07:56 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") [ 866.234905][ T4115] bond0 (unregistering): Released all slaves 12:07:56 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:07:57 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:07:57 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:07:58 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893") 12:07:58 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498") [ 869.973433][ T1382] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.979750][ T1382] ieee802154 phy1 wpan1: encryption failed: -22 12:08:00 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893") 12:08:00 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498") 12:08:01 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893") 12:08:02 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498") 12:08:03 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f") 12:08:04 executing program 2: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:08:04 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893") 12:08:04 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f") 12:08:06 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f") 12:08:07 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893") [ 878.462423][ T8313] Bluetooth: hci5: command 0x0409 tx timeout 12:08:08 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f") 12:08:09 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f49893") 12:08:09 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:08:09 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") [ 879.739943][ T4115] team0 (unregistering): Port device team_slave_1 removed [ 879.771156][ T4115] team0 (unregistering): Port device team_slave_0 removed [ 879.784944][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 879.825629][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 880.532315][ T8313] Bluetooth: hci5: command 0x041b tx timeout 12:08:12 executing program 3: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") [ 882.622392][ T8317] Bluetooth: hci5: command 0x040f tx timeout 12:08:13 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c") [ 884.702250][ T8316] Bluetooth: hci5: command 0x0419 tx timeout 12:08:14 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") [ 884.795881][ T4115] bond0 (unregistering): Released all slaves 12:08:16 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c") 12:08:18 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0) 12:08:21 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), 0x0) 12:08:23 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:08:25 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 895.394107][ T4115] team0 (unregistering): Port device team_slave_1 removed [ 895.582885][ T3532] Bluetooth: hci3: command 0x0409 tx timeout [ 895.945275][ T4115] team0 (unregistering): Port device team_slave_0 removed [ 896.907361][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 897.662165][ T3532] Bluetooth: hci3: command 0x041b tx timeout 12:08:28 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 898.598315][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 899.742189][ T3532] Bluetooth: hci3: command 0x040f tx timeout 12:08:30 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 900.307051][ T4115] bond0 (unregistering): Released all slaves [ 901.822160][ T8313] Bluetooth: hci3: command 0x0419 tx timeout 12:08:33 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:08:36 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce", 0x86, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:08:37 executing program 3: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, 0x0, 0x0, &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f4") 12:08:40 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 910.622254][ T8313] Bluetooth: hci6: command 0x0409 tx timeout [ 912.692333][ T1069] Bluetooth: hci6: command 0x041b tx timeout [ 913.012328][ T21] Bluetooth: hci1: command 0x0406 tx timeout 12:08:43 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 913.544116][ T4115] team0 (unregistering): Port device team_slave_1 removed [ 914.781995][T11547] Bluetooth: hci6: command 0x040f tx timeout [ 914.950931][ T4115] team0 (unregistering): Port device team_slave_0 removed [ 915.065400][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 12:08:45 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d7", 0x35, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 916.165689][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 916.852256][T11547] Bluetooth: hci6: command 0x0419 tx timeout 12:08:49 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916", 0x85, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:08:50 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 922.282965][ T4115] bond0 (unregistering): Released all slaves 12:08:52 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 924.132246][T11547] Bluetooth: hci7: command 0x0409 tx timeout 12:08:55 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 926.212264][ T3563] Bluetooth: hci7: command 0x041b tx timeout 12:08:56 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:08:57 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690c", 0x83, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 928.292171][ T3563] Bluetooth: hci7: command 0x040f tx timeout 12:08:59 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:09:00 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 930.372284][ T3563] Bluetooth: hci7: command 0x0419 tx timeout [ 931.413358][ T1382] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.419657][ T1382] ieee802154 phy1 wpan1: encryption failed: -22 12:09:02 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:09:04 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855", 0x34, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 935.943446][ T4115] team0 (unregistering): Port device team_slave_1 removed [ 937.250032][ T4115] team0 (unregistering): Port device team_slave_0 removed 12:09:08 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) [ 937.990631][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 12:09:09 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 939.411547][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 12:09:10 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0xb0188080, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274", 0x7f, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:09:12 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 943.739316][ T4115] bond0 (unregistering): Released all slaves [ 944.372224][ T21] Bluetooth: hci8: command 0x0409 tx timeout 12:09:14 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:09:16 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777", 0x36, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 946.452218][ T21] Bluetooth: hci8: command 0x041b tx timeout [ 948.532186][ T21] Bluetooth: hci8: command 0x040f tx timeout 12:09:18 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b", 0x38, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:09:20 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b", 0x38, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 950.622111][ T21] Bluetooth: hci8: command 0x0419 tx timeout 12:09:21 executing program 1: syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b", 0x38, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 952.731326][ T4115] team0 (unregistering): Port device team_slave_1 removed [ 953.172672][ T4115] team0 (unregistering): Port device team_slave_0 removed 12:09:23 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 953.708736][ T4115] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 953.972142][ T21] Bluetooth: hci2: command 0x0406 tx timeout [ 954.912767][ T4115] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 12:09:26 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:09:27 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") 12:09:29 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 960.462930][ T4115] bond0 (unregistering): Released all slaves 12:09:31 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r1 = syz_clone(0x80000000, &(0x7f0000000180)="3c38c8701bce1549c60e985fa5e2c8017eb2f77264004221b0ab1d358b660c0c935c83bf29fc8bebd95dcfb0fd7666e42718c3b01993f44d7ac35623b2d7a8e430f724cfc36a0e86bb2765fef1671fe1cd2d8ea5fe86f9eaf74798a522f46e2bcc99635c04f7614926182a50a979709b09de356b2e12e43c82ebb1e7b185eb4abd48d98345752b0e1d6f1e84bac5feae3da08ddd1b861193a363a8a93d0a53d83e2a7ea0569ff18acd4cdacfc3a10d0ee9246cad2975a9bc35529382c028fbadb2f143c38a7d3d1d00e70f", 0xcb, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="075d91bc3d595c170dff93bb6988a80235216c6980bc1c38c06480022cf18febf2c003e62838d4e17bfde44de53a3285f944132973fd8300db8f8ac7f3238b3ae1f958a16555734abd78c33fc91be10c79626b8b9df1829a6aae2cf9dd2da9e7c586246bb388497daedf7688894e8836d8f712f88fa00f9500d923501aa12cfc72cb5a0243ae44ff23ae463ba8772a1a0ee364d6637991c99f94ea7522e5751c60932d59e1f1f963a8d408e82d4be9a46e17531829497d70dbc072f443467cedc1a9d003c4dad392b706e268e5b1a258fb8401914f0a") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x0, 0x5, 0x6, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6afc, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0xa, 0xffff, 0x6, 0x3, 0x400, 0x4cdd, 0x101, 0x0, 0x4, 0x0, 0x7fff}, r1, 0x2, r0, 0x7054b5135884cefc) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='btrfs_handle_em_exist\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, r2, 0x0, 0x9, &(0x7f0000000480)='@:*/]-**\x00'}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x5f, 0x30, 0x5f]}}, &(0x7f0000000780)=""/4096, 0x29, 0x1000, 0x0, 0x8}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) syz_clone(0x0, &(0x7f0000001800)="8bd8ac3e70b414966f4e9bff085071484038ba22c33c3e36624cd8da12271ec9d5641d37b3401321581d4ccd0ceb6e64ea887855d777636b1ff0a71d776d93c1ece7796b81f8ffb0eedcb3b5a8b2bea8c56fa5754c93df942a2829c11c86876d6d63ceab923078fccf4e279b9f07f6a8d5c41e4f1a8b5143897221a22bb274d757690cb916ce2d", 0x87, &(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)="157aa5d952eed0aecb4ed5784840afe5990e112f453cb30e9f9b7140a886cc3c2339046237525474579b1dda11a660dbb3caedda2e5f8e16db5cc1a3d4cd24c56bc4aa37e36eabf935c06221932cf6c64a10e46996badd2983da5e07269a6eb71b0cab31ec8af7a3c44016446c5059b55704bf2b751f56cdd615c3ec48ec2c74924a58cbbf712f23761a7a25f498936f97") [ 961.652163][ T21] Bluetooth: hci9: command 0x0409 tx timeout [ 962.835839][T12407] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 12:09:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x7, 0x1, 0x6, 0x0, 0x3ff, 0x800, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f97, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x580, 0x2, 0xfd3, 0x9, 0x9, 0x73, 0xe00, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x2) [ 963.732227][ T21] Bluetooth: hci9: command 0x041b tx timeout [ 964.052495][ T27] INFO: task kworker/1:8:11543 blocked for more than 143 seconds. [ 964.060544][ T27] Not tainted 5.15.149-syzkaller #0 [ 964.092073][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 964.100768][ T27] task:kworker/1:8 state:D stack:25176 pid:11543 ppid: 2 flags:0x00004000 [ 964.131319][ T27] Workqueue: events nsim_dev_trap_report_work [ 964.142063][ T27] Call Trace: [ 964.145361][ T27] [ 964.148291][ T27] __schedule+0x12c4/0x45b0 [ 964.162076][ T27] ? mark_lock+0x98/0x340 [ 964.166505][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 964.182062][ T27] ? __sched_text_start+0x8/0x8 [ 964.186932][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 964.232121][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 964.237360][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 964.252842][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 964.258109][ T27] schedule+0x11b/0x1f0 [ 964.281215][ T27] schedule_preempt_disabled+0xf/0x20 [ 964.298404][ T27] __mutex_lock_common+0xe34/0x25a0 [ 964.304099][ T27] ? nsim_dev_trap_report_work+0x56/0xab0 [ 964.309840][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 964.323417][ T27] mutex_lock_nested+0x17/0x20 [ 964.328220][ T27] nsim_dev_trap_report_work+0x56/0xab0 [ 964.334281][ T27] ? print_irqtrace_events+0x210/0x210 [ 964.342332][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 964.348247][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 964.362073][ T27] process_one_work+0x8a1/0x10c0 [ 964.367143][ T27] ? worker_detach_from_pool+0x260/0x260 [ 964.384373][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 964.389944][ T27] ? kthread_data+0x4e/0xc0 [ 964.403467][ T27] ? wq_worker_running+0x97/0x170 [ 964.414690][ T27] worker_thread+0xaca/0x1280 [ 964.420064][ T27] kthread+0x3f6/0x4f0 [ 964.433610][ T27] ? rcu_lock_release+0x20/0x20 [ 964.438486][ T27] ? kthread_blkcg+0xd0/0xd0 [ 964.452280][ T27] ret_from_fork+0x1f/0x30 [ 964.461307][ T27] [ 964.468255][ T27] [ 964.468255][ T27] Showing all locks held in the system: [ 964.488220][ T27] 3 locks held by kworker/0:0/7: [ 964.498610][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 964.520699][ T27] #1: ffffc90000cc7d20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 964.543979][ T27] #2: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 964.570734][ T27] 4 locks held by kworker/1:0/21: [ 964.582951][ T27] #0: ffff8880b9b39718 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 12:09:34 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x2) [ 964.602154][ T27] #1: ffff8880b9b27848 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x53d/0x810 [ 964.630230][ T27] #2: ffff8880b9b28098 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x120/0x260 [ 964.672132][ T27] #3: ffff888061d9c8e0 (&nsim_trap_data->trap_lock){+.+.}-{2:2}, at: nsim_dev_trap_report_work+0x1a3/0xab0 [ 964.692415][ T27] 1 lock held by khungtaskd/27: [ 964.697282][ T27] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 964.722068][ T27] 5 locks held by kworker/u4:1/144: [ 964.727289][ T27] 2 locks held by kworker/u4:2/153: [ 964.741973][ T27] 2 locks held by kworker/0:2/1066: [ 964.752063][ T27] #0: ffff888011c72138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 964.775865][ T27] #1: ffffc9000522fd20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 964.816540][ T27] 1 lock held by dhcpcd/3173: [ 964.821243][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: __netlink_dump_start+0x12e/0x6f0 [ 964.872082][ T27] 2 locks held by getty/3256: [ 964.876778][ T27] #0: ffff88814a9c7098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 964.922085][ T27] #1: ffffc90002bab2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 964.952857][ T27] 4 locks held by kworker/u4:6/4115: [ 964.958166][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 964.996433][ T27] #1: ffffc9000b7f7d20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 965.022215][ T27] #2: ffffffff8d9cff10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 965.031638][ T27] #3: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: netdev_run_todo+0xa4f/0xc40 [ 965.072844][ T27] 3 locks held by kworker/0:13/8313: [ 965.078157][ T27] #0: ffff8880242f2d38 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 965.122364][ T27] #1: ffffc90003c6fd20 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 965.157329][ T27] #2: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 965.192126][ T27] 4 locks held by syz-executor.1/11171: [ 965.197690][ T27] #0: ffffffff8c9aaa30 (dup_mmap_sem){.+.+}-{0:0}, at: copy_mm+0x223/0x1370 [ 965.218248][ T27] #1: ffff888078737828 (&mm->mmap_lock){++++}-{3:3}, at: copy_mm+0x242/0x1370 [ 965.251186][ T27] #2: ffff888024ee5528 (&mm->mmap_lock/1){+.+.}-{3:3}, at: copy_mm+0x35c/0x1370 [ 965.287389][ T27] #3: ffff8880775bdbe0 (&mapping->i_mmap_rwsem){++++}-{3:3}, at: copy_mm+0xad0/0x1370 [ 965.316471][ T27] 3 locks held by kworker/1:8/11543: [ 965.321784][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 965.346810][ T27] #1: ffffc90003987d20 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 965.370702][ T27] #2: ffff88807b581400 (&nsim_dev->port_list_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x56/0xab0 [ 965.392412][ T27] 1 lock held by syz-executor.4/11611: [ 965.397884][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 965.421870][ T27] 7 locks held by syz-executor.0/12407: [ 965.431275][ T27] #0: ffff88807f4a8460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x29a/0xe50 [ 965.457095][ T27] #1: ffff88807ec90c88 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0 [ 965.474858][ T27] #2: ffff88801a5221d8 (kn->active#233){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0 [ 965.498104][ T27] #3: ffffffff8d357ae8 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xf1/0x470 [ 965.522072][ T27] #4: ffff88807b580178 (&dev->mutex){....}-{3:3}, at: device_release_driver_internal+0xc2/0x7f0 [ 965.548531][ T27] #5: ffff88807b581400 (&nsim_dev->port_list_lock){+.+.}-{3:3}, at: nsim_dev_reload_destroy+0x118/0x240 [ 965.560801][ T27] #6: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: netdev_run_todo+0xa4f/0xc40 [ 965.570413][ T27] 3 locks held by syz-executor.1/12529: [ 965.590881][ T27] 2 locks held by syz-executor.1/12650: [ 965.596843][ T27] 3 locks held by syz-executor.4/12660: [ 965.612066][ T27] #0: ffff88807f410ff0 (&hdev->req_lock){+.+.}-{3:3}, at: hci_dev_do_close+0x63/0x1070 [ 965.642292][ T27] #1: ffff88807f410078 (&hdev->lock){+.+.}-{3:3}, at: hci_dev_do_close+0x431/0x1070 [ 965.651829][ T27] #2: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 965.699592][ T27] 3 locks held by syz-executor.1/12667: [ 965.705664][ T27] 2 locks held by syz-executor.3/12669: [ 965.711221][ T27] 3 locks held by syz-executor.1/12682: [ 965.735083][ T27] 2 locks held by syz-executor.1/12705: [ 965.740661][ T27] 1 lock held by syz-executor.2/12721: [ 965.772067][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 965.781082][ T27] 1 lock held by syz-executor.3/12750: [ 965.805768][ T27] #0: ffff88814b110bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 965.812214][ T21] Bluetooth: hci9: command 0x040f tx timeout [ 965.832297][ T27] 2 locks held by syz-executor.1/12865: [ 965.837864][ T27] 1 lock held by syz-executor.0/12927: [ 965.857522][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 965.875243][ T27] 1 lock held by syz-executor.2/13166: [ 965.880715][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 965.890716][ T27] 1 lock held by syz-executor.3/13190: [ 965.897697][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 965.911303][ T27] 1 lock held by syz-executor.4/13224: [ 965.920439][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 965.935870][ T27] 1 lock held by syz-executor.3/13490: [ 965.941783][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 965.965219][ T27] 3 locks held by syz-executor.1/13870: [ 965.970782][ T27] 3 locks held by syz-executor.1/13874: [ 965.990319][ T27] 1 lock held by syz-executor.0/13877: [ 966.001205][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 966.020998][ T27] 3 locks held by syz-executor.1/13900: [ 966.034008][ T27] 3 locks held by syz-executor.1/13904: [ 966.039571][ T27] 2 locks held by syz-executor.1/13909: [ 966.056821][ T27] 2 locks held by syz-executor.1/13914: [ 966.069323][ T27] 2 locks held by syz-executor.1/13918: [ 966.086580][ T27] 2 locks held by syz-executor.1/14026: [ 966.095824][ T27] 1 lock held by syz-executor.1/14033: [ 966.101294][ T27] 1 lock held by syz-executor.2/14036: [ 966.118243][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 966.138070][ T27] 2 locks held by syz-executor.1/14042: [ 966.149658][ T27] 3 locks held by syz-executor.1/14146: [ 966.161097][ T27] 3 locks held by syz-executor.1/14259: [ 966.175051][ T27] 2 locks held by syz-executor.1/14265: [ 966.180606][ T27] 2 locks held by syz-executor.1/14275: 12:09:36 executing program 1: perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x2) [ 966.198313][ T27] 1 lock held by syz-executor.4/14283: [ 966.209690][ T27] #0: ffffffff8d9dbac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 966.229401][ T27] 2 locks held by syz-executor.1/14288: [ 966.240900][ T27] 3 locks held by syz-executor.1/14292: [ 966.266655][ T27] [ 966.269655][ T27] ============================================= [ 966.269655][ T27] [ 966.322924][ T27] NMI backtrace for cpu 0 [ 966.327272][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.149-syzkaller #0 [ 966.335253][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 966.345306][ T27] Call Trace: [ 966.348587][ T27] [ 966.351518][ T27] dump_stack_lvl+0x1e3/0x2cb [ 966.356274][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 966.361912][ T27] ? panic+0x84d/0x84d [ 966.365981][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 966.371178][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 966.376117][ T27] ? __wake_up_klogd+0xd5/0x100 [ 966.380985][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 966.387140][ T27] ? _printk+0xd1/0x111 [ 966.391344][ T27] ? panic+0x84d/0x84d [ 966.395414][ T27] ? __wake_up_klogd+0xcc/0x100 [ 966.400263][ T27] ? panic+0x84d/0x84d [ 966.404333][ T27] ? __rcu_read_unlock+0x92/0x100 [ 966.409367][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 966.415503][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 966.421494][ T27] watchdog+0xe72/0xeb0 [ 966.425712][ T27] kthread+0x3f6/0x4f0 [ 966.429783][ T27] ? hungtask_pm_notify+0x50/0x50 [ 966.434805][ T27] ? kthread_blkcg+0xd0/0xd0 [ 966.439397][ T27] ret_from_fork+0x1f/0x30 [ 966.443818][ T27] [ 966.447579][ T27] Sending NMI from CPU 0 to CPUs 1: [ 966.453045][ C1] NMI backtrace for cpu 1 [ 966.453056][ C1] CPU: 1 PID: 4228 Comm: kworker/u4:7 Not tainted 5.15.149-syzkaller #0 [ 966.453071][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 966.453080][ C1] Workqueue: bat_events batadv_nc_worker [ 966.453174][ C1] RIP: 0010:lock_release+0x5ce/0x9a0 [ 966.453190][ C1] Code: 08 48 8b 5c 24 28 49 89 dd 4c 8d b4 24 90 00 00 00 48 c7 c7 a0 27 8b 8a e8 3f 5a ba 08 b8 ff ff ff ff 65 0f c1 05 82 c5 9f 7e <83> f8 01 0f 85 94 00 00 00 4c 89 f3 48 c1 eb 03 42 80 3c 3b 00 74 [ 966.453203][ C1] RSP: 0018:ffffc9000bd97a00 EFLAGS: 00000057 [ 966.453214][ C1] RAX: 0000000000000001 RBX: 0000000000000246 RCX: ffffc9000bd97a03 [ 966.453224][ C1] RDX: 0000000000000002 RSI: ffffffff8a8b27a0 RDI: ffffffff8ad88e40 [ 966.453234][ C1] RBP: ffffc9000bd97b38 R08: dffffc0000000000 R09: fffffbfff1bc7746 [ 966.453244][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff920017b2f4c [ 966.453254][ C1] R13: 0000000000000246 R14: ffffc9000bd97a90 R15: dffffc0000000000 [ 966.453264][ C1] FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 966.453276][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 966.453286][ C1] CR2: 0000555556985788 CR3: 0000000059e65000 CR4: 00000000003506e0 [ 966.453299][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 966.453307][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 966.453315][ C1] Call Trace: [ 966.453320][ C1] [ 966.453324][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 966.453342][ C1] ? read_lock_is_recursive+0x10/0x10 [ 966.453357][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 966.453374][ C1] ? unknown_nmi_error+0xd0/0xd0 [ 966.453422][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 966.453437][ C1] ? nmi_handle+0xf7/0x370 [ 966.453452][ C1] ? lock_release+0x5ce/0x9a0 [ 966.453464][ C1] ? default_do_nmi+0x62/0x150 [ 966.453479][ C1] ? exc_nmi+0xab/0x120 [ 966.453491][ C1] ? end_repeat_nmi+0x16/0x31 [ 966.453509][ C1] ? lock_release+0x5ce/0x9a0 [ 966.453521][ C1] ? lock_release+0x5ce/0x9a0 [ 966.453535][ C1] ? lock_release+0x5ce/0x9a0 [ 966.453547][ C1] [ 966.453551][ C1] [ 966.453557][ C1] ? read_lock_is_recursive+0x10/0x10 [ 966.453570][ C1] ? batadv_nc_purge_paths+0x30e/0x3b0 [ 966.453584][ C1] ? __lock_acquire+0x1ff0/0x1ff0 [ 966.453596][ C1] ? do_raw_spin_lock+0x14a/0x370 [ 966.453611][ C1] ? __bpf_trace_softirq+0x10/0x10 [ 966.453626][ C1] ? __rwlock_init+0x140/0x140 [ 966.453641][ C1] ? batadv_nc_purge_paths+0xe8/0x3b0 [ 966.453655][ C1] ? batadv_nc_purge_paths+0x30e/0x3b0 [ 966.453669][ C1] _raw_spin_unlock_bh+0x17/0x30 [ 966.453685][ C1] ? batadv_nc_to_purge_nc_path_coding+0x120/0x120 [ 966.453700][ C1] batadv_nc_purge_paths+0x30e/0x3b0 [ 966.453719][ C1] batadv_nc_worker+0x30b/0x5b0 [ 966.453736][ C1] process_one_work+0x8a1/0x10c0 [ 966.453758][ C1] ? worker_detach_from_pool+0x260/0x260 [ 966.453774][ C1] ? _raw_spin_lock_irqsave+0x120/0x120 [ 966.453789][ C1] ? kthread_data+0x4e/0xc0 [ 966.453802][ C1] ? wq_worker_running+0x97/0x170 [ 966.453817][ C1] worker_thread+0xaca/0x1280 [ 966.453842][ C1] kthread+0x3f6/0x4f0 [ 966.453854][ C1] ? rcu_lock_release+0x20/0x20 [ 966.453868][ C1] ? kthread_blkcg+0xd0/0xd0 [ 966.453881][ C1] ret_from_fork+0x1f/0x30 [ 966.453902][ C1] [ 966.572918][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 966.796727][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.149-syzkaller #0 [ 966.804702][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 966.814755][ T27] Call Trace: [ 966.818026][ T27] [ 966.820952][ T27] dump_stack_lvl+0x1e3/0x2cb [ 966.825633][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 966.831274][ T27] ? panic+0x84d/0x84d [ 966.835353][ T27] panic+0x318/0x84d [ 966.839255][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 966.844883][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 966.851042][ T27] ? fb_is_primary_device+0xcc/0xcc [ 966.856242][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 966.862408][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 966.868564][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 966.874724][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 966.880883][ T27] watchdog+0xeb0/0xeb0 [ 966.885046][ T27] kthread+0x3f6/0x4f0 [ 966.889116][ T27] ? hungtask_pm_notify+0x50/0x50 [ 966.894140][ T27] ? kthread_blkcg+0xd0/0xd0 [ 966.898734][ T27] ret_from_fork+0x1f/0x30 [ 966.903159][ T27] [ 966.906322][ T27] Kernel Offset: disabled [ 966.910632][ T27] Rebooting in 86400 seconds..