b41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1574.298291][ T2705] netdevsim netdevsim0 netdevsim3: renamed from eth3 16:33:47 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0") 16:33:48 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0") [ 1574.988813][ T2732] netdevsim netdevsim4 netdevsim0: renamed from eth0 16:33:48 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1575.450100][ T2732] netdevsim netdevsim4 netdevsim1: renamed from eth1 16:33:48 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808") 16:33:48 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1575.821774][ T2732] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1576.543641][ T2734] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1576.587141][ T2732] netdevsim netdevsim4 netdevsim3: renamed from eth3 16:33:49 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808") 16:33:49 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1576.944407][ T2734] 8021q: adding VLAN 0 to HW filter on device team0 [ 1577.029335][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1577.037822][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1577.079773][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1577.108145][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1577.138349][T31829] bridge0: port 1(bridge_slave_0) entered blocking state [ 1577.145450][T31829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1577.168906][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1577.177908][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1577.186355][T31829] bridge0: port 2(bridge_slave_1) entered blocking state [ 1577.193480][T31829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1577.260402][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1577.268626][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1577.297689][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1577.306516][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1577.339173][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1577.388691][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1577.408260][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1577.423537][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1577.455693][ T2734] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1577.496461][ T2734] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1577.529418][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1577.539087][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1577.557939][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1577.566494][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 16:33:50 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808") [ 1577.598375][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1577.691786][ T2732] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1577.720298][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1577.738093][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1577.751784][ T2732] 8021q: adding VLAN 0 to HW filter on device team0 [ 1577.775225][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1577.793422][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1577.827919][ T2760] bridge0: port 1(bridge_slave_0) entered blocking state [ 1577.835054][ T2760] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1577.875688][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1577.898419][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1577.907241][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1577.926132][ T2691] bridge0: port 2(bridge_slave_1) entered blocking state [ 1577.933271][ T2691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1577.959796][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1577.978342][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1578.015171][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1578.038682][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1578.047699][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1578.055196][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1578.066065][ T2734] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1578.107764][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1578.115854][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1578.138823][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1578.157548][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1578.166060][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1578.194544][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 16:33:51 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1578.214355][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1578.250311][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 16:33:51 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c279") 16:33:52 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:33:52 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c279") 16:33:53 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:33:53 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c279") 16:33:53 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1580.665734][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1580.689314][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1580.746362][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1580.758152][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1580.783933][ T2734] device veth0_vlan entered promiscuous mode [ 1580.797584][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1580.818049][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1580.831454][ T2734] device veth1_vlan entered promiscuous mode 16:33:54 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca1") [ 1580.921211][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1580.932945][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1580.949159][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1580.968137][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1581.000772][ T2734] device veth0_macvtap entered promiscuous mode [ 1581.033545][ T2734] device veth1_macvtap entered promiscuous mode [ 1581.060490][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1581.074236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1581.087216][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1581.100708][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1581.139811][ T2732] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1581.158130][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.197395][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.210742][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.248385][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.268944][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.296668][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.327450][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.338287][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.357436][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.368462][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.397406][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.417441][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.447594][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:33:54 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1581.462427][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.487317][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.507399][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.548956][ T2734] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1581.556883][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1581.568094][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1581.598193][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1581.639386][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.677394][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1581.717447][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.745609][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1581.794293][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.807364][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1581.835291][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:33:54 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca1") [ 1581.887375][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1581.917320][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.937182][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1581.951546][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:33:55 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1581.979641][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1582.029944][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1582.049373][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1582.097294][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1582.118367][ T2734] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1582.127827][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1582.148039][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1582.160598][ T2734] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1582.217335][ T2734] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1582.226217][ T2734] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1582.237168][ T2734] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1582.330877][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1582.353355][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 16:33:56 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca1") 16:33:56 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1583.695226][ T2732] device veth0_vlan entered promiscuous mode 16:33:57 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:33:57 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1584.647605][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1584.656108][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1584.712641][ T2732] device veth1_vlan entered promiscuous mode [ 1584.731572][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1584.750691][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1584.829390][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1584.864236][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1584.888677][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1584.909367][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1584.937436][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1584.978710][ T2732] device veth0_macvtap entered promiscuous mode 16:33:58 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x0, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1585.003659][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1585.018360][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1585.033405][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1585.043534][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1585.063815][ T2732] device veth1_macvtap entered promiscuous mode [ 1585.070510][T22507] Bluetooth: hci0: command 0x0409 tx timeout 16:33:58 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1585.214796][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:33:58 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x0, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1585.261773][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.317549][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.364478][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:33:58 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x0, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1585.417701][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.450045][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.477426][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.507341][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.537629][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.567415][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.608740][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.635114][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.657341][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.685719][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.718926][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:33:58 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, 0xffffffffffffffff, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1585.767400][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.788341][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.817183][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.877466][ T2732] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1585.908126][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1585.916440][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1585.958327][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1585.982369][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.005218][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.023581][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.047408][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:33:59 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, 0xffffffffffffffff, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1586.087309][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.117409][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.150875][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.167433][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.187708][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.210028][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.247355][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 16:33:59 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1586.267752][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.297309][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.328832][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.367557][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.387330][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.397193][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.438534][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.471487][ T2732] batman_adv: batadv0: Interface activated: batadv_slave_1 16:33:59 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, 0xffffffffffffffff, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1586.500211][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1586.517965][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1586.540572][ T2939] chnl_net:caif_netlink_parms(): no params data found [ 1586.577707][ T2732] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1586.586470][ T2732] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1586.617817][ T2732] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1586.626566][ T2732] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 16:33:59 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:33:59 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r6 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1587.157505][ T7] Bluetooth: hci0: command 0x041b tx timeout 16:34:00 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r6 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:01 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:01 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:01 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r6 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:01 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(0x0, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:02 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1589.237457][ T2760] Bluetooth: hci0: command 0x040f tx timeout 16:34:02 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(0x0, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:03 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(0x0, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:03 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:03 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:04 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1591.317582][ T2691] Bluetooth: hci0: command 0x0419 tx timeout 16:34:04 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:05 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1592.653182][ T2939] bridge0: port 1(bridge_slave_0) entered blocking state [ 1592.670367][ T2939] bridge0: port 1(bridge_slave_0) entered disabled state [ 1592.698533][ T2939] device bridge_slave_0 entered promiscuous mode [ 1592.729463][ T2939] bridge0: port 2(bridge_slave_1) entered blocking state [ 1592.752528][ T2939] bridge0: port 2(bridge_slave_1) entered disabled state [ 1592.760908][ T2939] device bridge_slave_1 entered promiscuous mode 16:34:06 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:06 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:07 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:08 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:08 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:09 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1596.358786][ T7] Bluetooth: hci3: command 0x0409 tx timeout 16:34:09 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:10 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:11 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1598.427463][ T2691] Bluetooth: hci3: command 0x041b tx timeout [ 1599.480975][ T2939] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 16:34:12 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1599.558488][ T2939] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 16:34:12 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1600.517515][ T7] Bluetooth: hci3: command 0x040f tx timeout [ 1600.645755][ T2939] team0: Port device team_slave_0 added [ 1600.669448][ T2939] team0: Port device team_slave_1 added [ 1600.783467][ T2939] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1600.829078][ T2939] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1600.938597][ T2939] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1600.989707][ T2939] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1601.004987][ T2939] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1601.065868][ T2939] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1601.170739][ T3098] chnl_net:caif_netlink_parms(): no params data found [ 1601.196286][ T2939] device hsr_slave_0 entered promiscuous mode [ 1601.223801][ T2939] device hsr_slave_1 entered promiscuous mode [ 1601.241768][ T2939] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1601.258635][ T2939] Cannot create hsr debugfs directory [ 1601.499091][ T3098] bridge0: port 1(bridge_slave_0) entered blocking state [ 1601.533377][ T3098] bridge0: port 1(bridge_slave_0) entered disabled state [ 1601.554063][ T3098] device bridge_slave_0 entered promiscuous mode [ 1601.613439][ T3098] bridge0: port 2(bridge_slave_1) entered blocking state [ 1601.625686][ T3098] bridge0: port 2(bridge_slave_1) entered disabled state [ 1601.645317][ T3098] device bridge_slave_1 entered promiscuous mode [ 1601.750673][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1601.786482][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1601.879321][ T3098] team0: Port device team_slave_0 added [ 1601.897924][ T3098] team0: Port device team_slave_1 added [ 1601.956456][ T3098] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1601.972664][ T3098] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1602.001892][ T3098] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 16:34:15 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:15 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:15 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:15 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1602.597491][ T2760] Bluetooth: hci3: command 0x0419 tx timeout 16:34:16 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:16 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:17 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:17 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:17 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:17 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:18 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1605.005314][ T3098] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1605.016208][ T3098] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1605.111431][ T3098] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 16:34:18 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) 16:34:18 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:18 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:19 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:19 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:20 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) 16:34:20 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1607.229353][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1607.235671][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 16:34:21 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:21 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1609.003024][ T3098] device hsr_slave_0 entered promiscuous mode 16:34:22 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) 16:34:22 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1609.679801][ T3098] device hsr_slave_1 entered promiscuous mode 16:34:23 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:23 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1610.337608][ T3098] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1610.345218][ T3098] Cannot create hsr debugfs directory 16:34:24 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:24 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:25 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:25 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:26 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:27 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:28 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1615.947152][ T2939] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1616.642424][ T2939] netdevsim netdevsim0 netdevsim1: renamed from eth1 16:34:29 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:30 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:30 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:30 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1617.945149][ T2939] netdevsim netdevsim0 netdevsim2: renamed from eth2 16:34:31 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:31 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:32 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:32 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:32 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1620.360006][ T2939] netdevsim netdevsim0 netdevsim3: renamed from eth3 16:34:33 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:34 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:34 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:35 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:35 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:36 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1623.358308][ T3098] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 16:34:36 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:36 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1624.417816][ T2939] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1624.465587][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1624.491583][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1624.519350][ T2939] 8021q: adding VLAN 0 to HW filter on device team0 [ 1624.542192][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1624.558146][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1624.577711][T23302] bridge0: port 1(bridge_slave_0) entered blocking state [ 1624.584807][T23302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1624.658047][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1624.666632][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1624.698069][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1624.717680][T31406] bridge0: port 2(bridge_slave_1) entered blocking state [ 1624.724793][T31406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1624.797963][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1624.808335][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1624.859539][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1624.870479][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1624.908863][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1624.940429][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1624.979187][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1624.998127][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1625.024393][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1625.053711][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1625.080643][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1625.101020][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 16:34:38 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:38 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:39 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:40 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:41 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1628.100713][ T3098] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 16:34:41 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1628.957639][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1628.965194][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1628.992709][ T2939] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1629.033230][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1629.047927][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 16:34:42 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1629.092050][ T2939] device veth0_vlan entered promiscuous mode [ 1629.128481][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1629.148059][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1629.183669][ T2939] device veth1_vlan entered promiscuous mode [ 1629.197965][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1629.219621][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1629.258290][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1629.280954][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1629.364464][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1629.408042][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1629.419812][ T2939] device veth0_macvtap entered promiscuous mode [ 1629.469819][ T2939] device veth1_macvtap entered promiscuous mode [ 1629.503946][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.548333][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.587540][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:34:42 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1629.598343][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.619659][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.658531][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.687436][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.717487][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.743914][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.770174][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.807456][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.837475][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.857383][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.887441][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.917449][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.947492][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.984471][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1630.024984][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.060390][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1630.092179][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.128069][ T2939] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1630.149123][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1630.167891][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1630.188228][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1630.218210][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1630.246046][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.277408][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.327402][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.347787][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.381671][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.420741][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:34:43 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1630.457318][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.477314][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.487162][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.557408][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.597497][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.617320][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.627209][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.667860][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.685774][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.736249][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.757341][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.808508][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.828648][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 16:34:43 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1630.857563][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.878843][ T2939] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1630.887396][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1630.896104][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1630.934279][ T2939] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1630.987335][ T2939] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1630.996081][ T2939] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1631.033356][ T2939] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 16:34:44 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1632.047973][ T3098] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 16:34:45 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:46 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:46 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:47 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:47 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:47 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1634.917606][ T7] Bluetooth: hci1: command 0x0406 tx timeout 16:34:48 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1635.258507][ T3098] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 16:34:48 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:48 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1636.548132][ T577] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1636.562711][ T577] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1636.661444][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1636.687493][T21154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1636.702683][T21154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1636.724942][ T3098] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1636.818147][ T3098] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1636.838559][ T3098] netdevsim netdevsim4 netdevsim2: renamed from eth2 16:34:49 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1636.873496][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1636.885189][ T3098] netdevsim netdevsim4 netdevsim3: renamed from eth3 16:34:50 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1637.152469][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1637.194695][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1637.205001][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1637.234194][ T3098] 8021q: adding VLAN 0 to HW filter on device team0 [ 1637.282178][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1637.291552][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1637.317976][ T3099] bridge0: port 1(bridge_slave_0) entered blocking state [ 1637.325076][ T3099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1637.388626][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1637.396687][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1637.418411][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1637.426853][T31830] bridge0: port 2(bridge_slave_1) entered blocking state [ 1637.434076][T31830] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1637.464511][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1637.488335][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1637.511811][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1637.521246][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1637.532727][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1637.543047][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1637.552126][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1637.560672][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1637.573425][ T3098] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1637.586854][ T3098] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1637.596046][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1637.604922][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1637.613735][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 16:34:50 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:51 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1638.808620][ T3098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1638.816726][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1638.829850][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 16:34:52 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:52 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1639.340465][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1639.349328][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1639.412011][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1639.427156][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1639.456856][ T3098] device veth0_vlan entered promiscuous mode [ 1639.499475][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1639.508487][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 16:34:52 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:52 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:52 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1639.568848][ T3098] device veth1_vlan entered promiscuous mode [ 1639.653143][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1639.667994][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1639.704535][ T3098] device veth0_macvtap entered promiscuous mode [ 1639.714635][ T3098] device veth1_macvtap entered promiscuous mode [ 1639.786521][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1639.827272][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1639.862040][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1639.901865][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1639.937567][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1639.975660][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.019129][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.038821][ T3704] Bluetooth: hci2: command 0x0406 tx timeout [ 1640.069512][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.094224][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.129880][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.168986][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.212660][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.235566][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:34:53 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:53 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1640.311115][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.347677][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.383103][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.421344][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.509627][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.537352][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.597356][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.627333][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.667786][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.692361][ T3098] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1640.728057][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1640.736396][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1640.765366][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 16:34:53 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex, r2, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1640.798087][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1640.823161][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1640.857446][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.886337][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1640.932024][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.967518][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1640.996520][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.031992][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.067983][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.105266][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.140430][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.174908][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 16:34:54 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1641.216923][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.247340][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.292614][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.325574][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.368647][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.428435][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.467717][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:34:54 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:54 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex, r2, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1641.486057][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.537370][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.555516][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.609079][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.637465][ T3098] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1641.645083][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1641.660594][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1641.705664][ T3098] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.730547][ T3098] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.755807][ T3098] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.797379][ T3098] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 16:34:55 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex, r2, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:55 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:55 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:55 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:56 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:56 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:34:56 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:57 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:57 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:57 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:57 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x0, 0x0}, 0x10) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex, r2, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1644.893309][ T1238] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1644.967484][ T1238] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1644.977777][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1645.029657][T21154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1645.067721][T21154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 16:34:58 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1645.076816][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 16:34:58 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:58 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:58 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:58 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:59 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:59 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:59 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x0, 0x0}, 0x10) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex, r2, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:59 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:59 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:59 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:00 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:00 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x0, 0x0}, 0x10) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex, r2, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:00 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:35:01 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:01 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:35:01 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:01 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:02 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:02 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:02 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640), &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:02 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:03 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:03 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640), &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:35:03 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:03 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640), &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:04 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:04 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:05 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:05 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:05 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:06 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:06 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:06 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:07 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:07 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:07 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:07 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:07 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1655.387491][T31830] Bluetooth: hci4: command 0x0406 tx timeout 16:35:08 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:08 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:09 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:10 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1657.689320][ T3981] chnl_net:caif_netlink_parms(): no params data found 16:35:11 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:11 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:35:11 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:11 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:12 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:12 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1659.397439][ T7] Bluetooth: hci3: command 0x0409 tx timeout 16:35:12 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1659.901886][ T3981] bridge0: port 1(bridge_slave_0) entered blocking state [ 1659.927339][ T3981] bridge0: port 1(bridge_slave_0) entered disabled state [ 1659.935634][ T3981] device bridge_slave_0 entered promiscuous mode [ 1660.002205][ T3981] bridge0: port 2(bridge_slave_1) entered blocking state [ 1660.087575][ T3981] bridge0: port 2(bridge_slave_1) entered disabled state [ 1660.095882][ T3981] device bridge_slave_1 entered promiscuous mode 16:35:13 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1660.480205][ T3981] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1660.520588][ T3981] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 16:35:14 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1661.467443][T23302] Bluetooth: hci3: command 0x041b tx timeout 16:35:14 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1661.881041][ T3981] team0: Port device team_slave_0 added 16:35:15 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1662.272715][ T3981] team0: Port device team_slave_1 added 16:35:15 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:16 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:16 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1663.548409][T23302] Bluetooth: hci3: command 0x040f tx timeout 16:35:16 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:17 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:18 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:18 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:18 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1665.601812][ T3981] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1665.618742][ T3981] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 16:35:18 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1665.646564][T31826] Bluetooth: hci3: command 0x0419 tx timeout 16:35:18 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1665.732998][ T3981] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1665.781504][ T3981] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1665.817406][ T3981] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1665.927305][ T3981] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1668.668647][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1668.675013][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 16:35:21 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:22 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:24 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:26 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1675.113208][ T3981] device hsr_slave_0 entered promiscuous mode 16:35:28 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1675.620613][ T3981] device hsr_slave_1 entered promiscuous mode [ 1676.141523][ T3981] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1676.167305][ T3981] Cannot create hsr debugfs directory 16:35:32 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:33 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:36 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:37 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:39 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1688.277323][ T3703] Bluetooth: hci0: command 0x0409 tx timeout [ 1688.445688][ T3981] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 16:35:41 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1690.347425][ T3564] Bluetooth: hci0: command 0x041b tx timeout 16:35:43 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:35:44 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:44 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1692.427447][T23302] Bluetooth: hci0: command 0x040f tx timeout 16:35:46 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1693.768229][ T3981] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1694.507457][ T3564] Bluetooth: hci0: command 0x0419 tx timeout [ 1694.587376][ T3704] Bluetooth: hci1: command 0x0409 tx timeout [ 1694.827565][T31406] Bluetooth: hci4: command 0x0409 tx timeout 16:35:47 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:49 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1696.689680][T22507] Bluetooth: hci1: command 0x041b tx timeout [ 1696.907552][T22507] Bluetooth: hci4: command 0x041b tx timeout [ 1697.175819][ T3981] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 16:35:51 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1698.747701][ T3701] Bluetooth: hci1: command 0x040f tx timeout [ 1698.987434][T22507] Bluetooth: hci4: command 0x040f tx timeout 16:35:52 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1700.294011][ T3981] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1700.827377][T22507] Bluetooth: hci1: command 0x0419 tx timeout [ 1701.077368][T22507] Bluetooth: hci4: command 0x0419 tx timeout [ 1701.111691][ T4211] chnl_net:caif_netlink_parms(): no params data found 16:35:54 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 16:35:55 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 16:35:56 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 16:35:56 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 16:35:57 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:58 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1706.111876][ T7841] device hsr_slave_0 left promiscuous mode 16:35:59 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1706.516688][ T7841] device hsr_slave_1 left promiscuous mode [ 1707.109152][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1707.116651][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 16:36:00 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") [ 1707.463667][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1707.471394][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1707.926911][ T7841] device bridge_slave_1 left promiscuous mode [ 1707.954584][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state 16:36:01 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") [ 1708.739294][ T7841] device bridge_slave_0 left promiscuous mode [ 1708.745586][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:02 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:36:03 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1710.604140][ T7841] device hsr_slave_0 left promiscuous mode 16:36:04 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1711.291156][ T7841] device hsr_slave_1 left promiscuous mode 16:36:04 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") [ 1711.968039][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1712.234374][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1712.400119][ T7841] device bridge_slave_1 left promiscuous mode [ 1712.406360][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state 16:36:05 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1712.920814][ T7841] device bridge_slave_0 left promiscuous mode [ 1712.937348][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state [ 1713.344267][ T7841] device bridge_slave_1 left promiscuous mode [ 1713.350590][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state 16:36:06 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1713.939669][ T7841] device bridge_slave_0 left promiscuous mode [ 1713.945921][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state [ 1713.999050][ T7841] device bridge_slave_0 left promiscuous mode [ 1714.005284][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:08 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:36:08 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1715.857750][ T7841] device hsr_slave_0 left promiscuous mode 16:36:09 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1716.515291][ T7841] device hsr_slave_1 left promiscuous mode [ 1717.192444][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1717.208582][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1717.411328][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1717.436013][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 16:36:10 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1717.856914][ T7841] device bridge_slave_1 left promiscuous mode [ 1717.872341][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state [ 1718.550397][ T7841] device bridge_slave_0 left promiscuous mode [ 1718.562689][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:11 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1719.053219][ T7841] device hsr_slave_0 left promiscuous mode [ 1719.062689][ T7841] device hsr_slave_1 left promiscuous mode [ 1719.659891][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1719.684144][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 16:36:13 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 1720.071525][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1720.089070][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1720.334998][ T7841] device bridge_slave_1 left promiscuous mode [ 1720.358862][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state 16:36:13 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 1720.890155][ T7841] device bridge_slave_0 left promiscuous mode [ 1720.896417][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:14 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 16:36:15 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1722.830837][ T7841] device hsr_slave_0 left promiscuous mode 16:36:16 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1723.784883][ T7841] device hsr_slave_1 left promiscuous mode [ 1724.117578][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1724.126083][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1724.381728][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1724.410623][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1724.480727][ T7841] device bridge_slave_1 left promiscuous mode [ 1724.486949][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state [ 1724.861455][ T7841] device bridge_slave_0 left promiscuous mode [ 1724.887362][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:18 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1725.467316][T23302] Bluetooth: hci5: command 0x0409 tx timeout 16:36:18 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1726.343977][ T7841] device hsr_slave_0 left promiscuous mode 16:36:19 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1726.994587][ T7841] device hsr_slave_1 left promiscuous mode 16:36:20 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1727.548139][ T3564] Bluetooth: hci5: command 0x041b tx timeout [ 1727.645236][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1727.656802][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1727.951618][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1727.977870][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 16:36:21 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1728.319604][ T7841] device bridge_slave_1 left promiscuous mode [ 1728.325928][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state [ 1729.017905][ T7841] device bridge_slave_0 left promiscuous mode [ 1729.024152][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state [ 1729.627568][T31830] Bluetooth: hci5: command 0x040f tx timeout [ 1729.851685][ T7841] device hsr_slave_0 left promiscuous mode 16:36:23 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1730.108801][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1730.115138][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 1730.297692][ T7841] device hsr_slave_1 left promiscuous mode [ 1730.667752][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1730.675601][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1730.928803][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1730.936390][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 16:36:24 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1731.259718][ T7841] device bridge_slave_1 left promiscuous mode [ 1731.265966][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state 16:36:24 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1731.707444][T31830] Bluetooth: hci5: command 0x0419 tx timeout [ 1731.788340][ T7841] device bridge_slave_0 left promiscuous mode [ 1731.797701][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:25 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1733.138719][ T7841] device hsr_slave_0 left promiscuous mode 16:36:26 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1733.687520][ T7841] device hsr_slave_1 left promiscuous mode 16:36:27 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1734.185819][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1734.207400][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1734.263952][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1734.277380][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1734.300091][ T7841] device bridge_slave_1 left promiscuous mode [ 1734.306298][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state [ 1734.938146][ T7841] device bridge_slave_0 left promiscuous mode [ 1734.947516][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:28 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:36:29 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1737.130939][ T7841] device veth1_macvtap left promiscuous mode [ 1737.137047][ T7841] device veth0_macvtap left promiscuous mode [ 1737.151055][ T7841] device veth1_vlan left promiscuous mode [ 1737.157139][ T7841] device veth0_vlan left promiscuous mode 16:36:30 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1738.137911][ T7841] device veth1_macvtap left promiscuous mode [ 1738.143990][ T7841] device veth0_macvtap left promiscuous mode [ 1738.159407][ T7841] device veth1_vlan left promiscuous mode [ 1738.167857][ T7841] device veth0_vlan left promiscuous mode 16:36:31 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1739.266432][ T7841] device veth1_macvtap left promiscuous mode [ 1739.278042][ T7841] device veth0_macvtap left promiscuous mode [ 1739.307301][ T7841] device veth1_vlan left promiscuous mode [ 1739.313133][ T7841] device veth0_vlan left promiscuous mode 16:36:33 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:36:33 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1741.617559][ T7841] device veth1_macvtap left promiscuous mode [ 1741.623656][ T7841] device veth0_macvtap left promiscuous mode [ 1741.650611][ T7841] device veth1_vlan left promiscuous mode [ 1741.656436][ T7841] device veth0_vlan left promiscuous mode 16:36:34 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:36:35 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1743.763133][ T7841] device veth1_macvtap left promiscuous mode [ 1743.777786][ T7841] device veth0_macvtap left promiscuous mode [ 1743.783888][ T7841] device veth1_vlan left promiscuous mode [ 1743.810812][ T7841] device veth0_vlan left promiscuous mode 16:36:37 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1744.288117][ T7841] device veth1_macvtap left promiscuous mode [ 1744.294174][ T7841] device veth0_macvtap left promiscuous mode [ 1744.327299][ T7841] device veth1_vlan left promiscuous mode [ 1744.337761][ T7841] device veth0_vlan left promiscuous mode [ 1746.193201][ T7841] device veth1_macvtap left promiscuous mode [ 1746.207800][ T7841] device veth0_macvtap left promiscuous mode [ 1746.213889][ T7841] device veth1_vlan left promiscuous mode [ 1746.237419][ T7841] device veth0_vlan left promiscuous mode [ 1754.187348][ T3099] Bluetooth: hci6: command 0x0409 tx timeout [ 1756.267402][T22507] Bluetooth: hci6: command 0x041b tx timeout [ 1758.357371][T22507] Bluetooth: hci6: command 0x040f tx timeout [ 1760.437360][ T3704] Bluetooth: hci6: command 0x0419 tx timeout 16:36:53 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1760.677341][T22507] Bluetooth: hci7: command 0x0409 tx timeout [ 1760.757420][T22507] Bluetooth: hci8: command 0x0409 tx timeout [ 1762.747574][ T3703] Bluetooth: hci7: command 0x041b tx timeout [ 1762.839504][ T3704] Bluetooth: hci8: command 0x041b tx timeout [ 1764.827345][T22507] Bluetooth: hci7: command 0x040f tx timeout [ 1764.907356][T22507] Bluetooth: hci8: command 0x040f tx timeout [ 1766.907468][T22507] Bluetooth: hci7: command 0x0419 tx timeout [ 1766.997331][T22507] Bluetooth: hci8: command 0x0419 tx timeout 16:37:05 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:37:10 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1783.387419][ T3703] Bluetooth: hci3: command 0x0406 tx timeout 16:37:16 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:17 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:18 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:37:19 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:37:20 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:37:22 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:22 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:23 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:24 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1791.478393][ T3703] Bluetooth: hci9: command 0x0409 tx timeout [ 1791.549195][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1791.555626][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 16:37:24 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:25 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:25 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:26 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1793.557384][ T3099] Bluetooth: hci9: command 0x041b tx timeout 16:37:27 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:37:28 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1795.636189][ T3564] Bluetooth: hci9: command 0x040f tx timeout 16:37:29 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1797.707555][ T3564] Bluetooth: hci9: command 0x0419 tx timeout 16:37:30 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:37:31 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:33 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:35 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1802.972709][ T7841] team0 (unregistering): Port device team_slave_1 removed 16:37:36 executing program 3: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1803.414057][ T7841] team0 (unregistering): Port device team_slave_0 removed [ 1803.627990][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 16:37:36 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1803.923641][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:37:37 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:38 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:38 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1805.698107][ T7841] bond0 (unregistering): Released all slaves 16:37:39 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:40 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:40 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:41 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1808.987495][T31830] Bluetooth: hci0: command 0x0406 tx timeout 16:37:42 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:42 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1810.082268][ T7841] team0 (unregistering): Port device team_slave_1 removed [ 1810.109941][ T7841] team0 (unregistering): Port device team_slave_0 removed [ 1810.165763][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 16:37:43 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1810.802171][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:37:44 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:44 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:45 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") [ 1812.686554][ T7841] bond0 (unregistering): Released all slaves 16:37:45 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="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") 16:37:46 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="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") [ 1814.210423][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 16:37:47 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="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") [ 1815.161755][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:37:48 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 16:37:49 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:50 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1817.708058][ T7841] bond0 (unregistering): Released all slaves 16:37:51 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:37:51 executing program 3: syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:52 executing program 3: syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1819.228018][ T3564] Bluetooth: hci4: command 0x0406 tx timeout [ 1819.234083][ T3564] Bluetooth: hci1: command 0x0406 tx timeout 16:37:53 executing program 3: syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") [ 1819.908623][ T7841] bond0 (unregistering): Released all slaves [ 1820.267392][T31830] Bluetooth: hci10: command 0x0409 tx timeout 16:37:53 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:54 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") 16:37:54 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:37:55 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1822.358436][ T3703] Bluetooth: hci10: command 0x041b tx timeout 16:37:55 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:37:56 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1823.608576][ T7841] team0 (unregistering): Port device team_slave_1 removed 16:37:56 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1823.808048][ T7841] team0 (unregistering): Port device team_slave_0 removed 16:37:57 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1824.315827][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1824.436532][ T3703] Bluetooth: hci10: command 0x040f tx timeout 16:37:58 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1824.974227][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:37:58 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:37:59 executing program 3: syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:59 executing program 3: syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") [ 1826.488072][ T7841] bond0 (unregistering): Released all slaves [ 1826.517375][T22507] Bluetooth: hci10: command 0x0419 tx timeout [ 1826.667271][T22507] Bluetooth: hci11: command 0x0409 tx timeout [ 1826.827551][ T3564] Bluetooth: hci12: command 0x0409 tx timeout 16:38:00 executing program 3: syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:01 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1828.757346][ T3704] Bluetooth: hci11: command 0x041b tx timeout [ 1828.917270][ T3704] Bluetooth: hci12: command 0x041b tx timeout 16:38:02 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:02 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:03 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1830.357990][ T7841] team0 (unregistering): Port device team_slave_1 removed [ 1830.379098][ T7841] team0 (unregistering): Port device team_slave_0 removed [ 1830.410806][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1830.436071][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1830.837321][ T3704] Bluetooth: hci11: command 0x040f tx timeout [ 1830.987407][ T3704] Bluetooth: hci12: command 0x040f tx timeout 16:38:04 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:04 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1831.886389][ T7841] bond0 (unregistering): Released all slaves 16:38:05 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:05 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1832.916365][ T3704] Bluetooth: hci11: command 0x0419 tx timeout [ 1833.067401][ T3704] Bluetooth: hci12: command 0x0419 tx timeout 16:38:06 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:06 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:07 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:38:07 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:08 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1835.504918][ T7841] team0 (unregistering): Port device team_slave_1 removed [ 1835.583165][ T7841] team0 (unregistering): Port device team_slave_0 removed [ 1836.118175][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 16:38:09 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1836.600206][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:38:10 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:38:10 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:38:10 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1838.738045][ T7841] bond0 (unregistering): Released all slaves 16:38:12 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:38:12 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:38:13 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:38:13 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:15 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1844.003951][ T7841] team0 (unregistering): Port device team_slave_1 removed [ 1844.147896][ T7841] team0 (unregistering): Port device team_slave_0 removed 16:38:17 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1844.556028][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 16:38:18 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:38:18 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1845.427888][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:38:19 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:38:19 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1847.065818][ T7841] bond0 (unregistering): Released all slaves 16:38:20 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:21 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:21 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:22 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1849.947226][ T3099] Bluetooth: hci5: command 0x0406 tx timeout 16:38:23 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1850.582776][ T7841] team0 (unregistering): Port device team_slave_1 removed [ 1850.960258][ T7841] team0 (unregistering): Port device team_slave_0 removed [ 1851.266575][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1851.866115][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:38:25 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1852.988871][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1852.995208][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 1855.191501][ T7841] bond0 (unregistering): Released all slaves 16:38:28 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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")