b41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1574.298291][ T2705] netdevsim netdevsim0 netdevsim3: renamed from eth3 16:33:47 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0") 16:33:48 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0") [ 1574.988813][ T2732] netdevsim netdevsim4 netdevsim0: renamed from eth0 16:33:48 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1575.450100][ T2732] netdevsim netdevsim4 netdevsim1: renamed from eth1 16:33:48 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808") 16:33:48 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1575.821774][ T2732] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1576.543641][ T2734] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1576.587141][ T2732] netdevsim netdevsim4 netdevsim3: renamed from eth3 16:33:49 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808") 16:33:49 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1576.944407][ T2734] 8021q: adding VLAN 0 to HW filter on device team0 [ 1577.029335][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1577.037822][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1577.079773][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1577.108145][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1577.138349][T31829] bridge0: port 1(bridge_slave_0) entered blocking state [ 1577.145450][T31829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1577.168906][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1577.177908][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1577.186355][T31829] bridge0: port 2(bridge_slave_1) entered blocking state [ 1577.193480][T31829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1577.260402][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1577.268626][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1577.297689][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1577.306516][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1577.339173][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1577.388691][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1577.408260][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1577.423537][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1577.455693][ T2734] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1577.496461][ T2734] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1577.529418][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1577.539087][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1577.557939][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1577.566494][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 16:33:50 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808") [ 1577.598375][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1577.691786][ T2732] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1577.720298][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1577.738093][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1577.751784][ T2732] 8021q: adding VLAN 0 to HW filter on device team0 [ 1577.775225][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1577.793422][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1577.827919][ T2760] bridge0: port 1(bridge_slave_0) entered blocking state [ 1577.835054][ T2760] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1577.875688][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1577.898419][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1577.907241][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1577.926132][ T2691] bridge0: port 2(bridge_slave_1) entered blocking state [ 1577.933271][ T2691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1577.959796][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1577.978342][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1578.015171][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1578.038682][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1578.047699][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1578.055196][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1578.066065][ T2734] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1578.107764][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1578.115854][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1578.138823][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1578.157548][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1578.166060][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1578.194544][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 16:33:51 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1578.214355][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1578.250311][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 16:33:51 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c279") 16:33:52 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:33:52 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c279") 16:33:53 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:33:53 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c279") 16:33:53 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1580.665734][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1580.689314][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1580.746362][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1580.758152][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1580.783933][ T2734] device veth0_vlan entered promiscuous mode [ 1580.797584][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1580.818049][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1580.831454][ T2734] device veth1_vlan entered promiscuous mode 16:33:54 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca1") [ 1580.921211][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1580.932945][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1580.949159][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1580.968137][T31829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1581.000772][ T2734] device veth0_macvtap entered promiscuous mode [ 1581.033545][ T2734] device veth1_macvtap entered promiscuous mode [ 1581.060490][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1581.074236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1581.087216][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1581.100708][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1581.139811][ T2732] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1581.158130][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.197395][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.210742][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.248385][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.268944][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.296668][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.327450][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.338287][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.357436][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.368462][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.397406][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.417441][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.447594][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:33:54 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1581.462427][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.487317][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1581.507399][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.548956][ T2734] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1581.556883][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1581.568094][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1581.598193][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1581.639386][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.677394][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1581.717447][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.745609][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1581.794293][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.807364][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1581.835291][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:33:54 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca1") [ 1581.887375][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1581.917320][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1581.937182][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1581.951546][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:33:55 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1581.979641][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1582.029944][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1582.049373][ T2734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1582.097294][ T2734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1582.118367][ T2734] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1582.127827][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1582.148039][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1582.160598][ T2734] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1582.217335][ T2734] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1582.226217][ T2734] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1582.237168][ T2734] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1582.330877][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1582.353355][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 16:33:56 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca1") 16:33:56 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1583.695226][ T2732] device veth0_vlan entered promiscuous mode 16:33:57 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:33:57 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1584.647605][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1584.656108][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1584.712641][ T2732] device veth1_vlan entered promiscuous mode [ 1584.731572][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1584.750691][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1584.829390][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1584.864236][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1584.888677][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1584.909367][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1584.937436][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1584.978710][ T2732] device veth0_macvtap entered promiscuous mode 16:33:58 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x0, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1585.003659][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1585.018360][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1585.033405][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1585.043534][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1585.063815][ T2732] device veth1_macvtap entered promiscuous mode [ 1585.070510][T22507] Bluetooth: hci0: command 0x0409 tx timeout 16:33:58 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1585.214796][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:33:58 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x0, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1585.261773][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.317549][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.364478][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:33:58 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x0, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1585.417701][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.450045][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.477426][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.507341][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.537629][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.567415][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.608740][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.635114][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.657341][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.685719][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.718926][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:33:58 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, 0xffffffffffffffff, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1585.767400][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.788341][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1585.817183][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1585.877466][ T2732] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1585.908126][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1585.916440][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1585.958327][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1585.982369][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.005218][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.023581][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.047408][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:33:59 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, 0xffffffffffffffff, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1586.087309][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.117409][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.150875][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.167433][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.187708][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.210028][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.247355][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 16:33:59 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1586.267752][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.297309][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.328832][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.367557][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.387330][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.397193][ T2732] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1586.438534][ T2732] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1586.471487][ T2732] batman_adv: batadv0: Interface activated: batadv_slave_1 16:33:59 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, 0xffffffffffffffff, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1586.500211][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1586.517965][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1586.540572][ T2939] chnl_net:caif_netlink_parms(): no params data found [ 1586.577707][ T2732] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1586.586470][ T2732] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1586.617817][ T2732] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1586.626566][ T2732] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 16:33:59 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:33:59 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r6 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1587.157505][ T7] Bluetooth: hci0: command 0x041b tx timeout 16:34:00 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r6 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:01 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:01 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:34:01 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r6 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r6, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:01 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(0x0, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:02 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb28") [ 1589.237457][ T2760] Bluetooth: hci0: command 0x040f tx timeout 16:34:02 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(0x0, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:03 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(0x0, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:03 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb28") 16:34:03 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:04 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1591.317582][ T2691] Bluetooth: hci0: command 0x0419 tx timeout 16:34:04 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:05 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1592.653182][ T2939] bridge0: port 1(bridge_slave_0) entered blocking state [ 1592.670367][ T2939] bridge0: port 1(bridge_slave_0) entered disabled state [ 1592.698533][ T2939] device bridge_slave_0 entered promiscuous mode [ 1592.729463][ T2939] bridge0: port 2(bridge_slave_1) entered blocking state [ 1592.752528][ T2939] bridge0: port 2(bridge_slave_1) entered disabled state [ 1592.760908][ T2939] device bridge_slave_1 entered promiscuous mode 16:34:06 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:06 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:07 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:08 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:08 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:09 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1596.358786][ T7] Bluetooth: hci3: command 0x0409 tx timeout 16:34:09 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:10 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:11 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1598.427463][ T2691] Bluetooth: hci3: command 0x041b tx timeout [ 1599.480975][ T2939] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 16:34:12 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1599.558488][ T2939] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 16:34:12 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1600.517515][ T7] Bluetooth: hci3: command 0x040f tx timeout [ 1600.645755][ T2939] team0: Port device team_slave_0 added [ 1600.669448][ T2939] team0: Port device team_slave_1 added [ 1600.783467][ T2939] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1600.829078][ T2939] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1600.938597][ T2939] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1600.989707][ T2939] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1601.004987][ T2939] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1601.065868][ T2939] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1601.170739][ T3098] chnl_net:caif_netlink_parms(): no params data found [ 1601.196286][ T2939] device hsr_slave_0 entered promiscuous mode [ 1601.223801][ T2939] device hsr_slave_1 entered promiscuous mode [ 1601.241768][ T2939] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1601.258635][ T2939] Cannot create hsr debugfs directory [ 1601.499091][ T3098] bridge0: port 1(bridge_slave_0) entered blocking state [ 1601.533377][ T3098] bridge0: port 1(bridge_slave_0) entered disabled state [ 1601.554063][ T3098] device bridge_slave_0 entered promiscuous mode [ 1601.613439][ T3098] bridge0: port 2(bridge_slave_1) entered blocking state [ 1601.625686][ T3098] bridge0: port 2(bridge_slave_1) entered disabled state [ 1601.645317][ T3098] device bridge_slave_1 entered promiscuous mode [ 1601.750673][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1601.786482][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1601.879321][ T3098] team0: Port device team_slave_0 added [ 1601.897924][ T3098] team0: Port device team_slave_1 added [ 1601.956456][ T3098] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1601.972664][ T3098] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1602.001892][ T3098] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 16:34:15 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:15 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:15 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:34:15 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1602.597491][ T2760] Bluetooth: hci3: command 0x0419 tx timeout 16:34:16 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:16 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:17 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:17 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:17 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:17 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:18 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1605.005314][ T3098] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1605.016208][ T3098] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1605.111431][ T3098] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 16:34:18 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) 16:34:18 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:18 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:19 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:19 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:20 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) 16:34:20 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1607.229353][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1607.235671][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 16:34:21 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:21 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1609.003024][ T3098] device hsr_slave_0 entered promiscuous mode 16:34:22 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) 16:34:22 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1609.679801][ T3098] device hsr_slave_1 entered promiscuous mode 16:34:23 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:23 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1610.337608][ T3098] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1610.345218][ T3098] Cannot create hsr debugfs directory 16:34:24 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:24 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:25 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:25 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:26 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:27 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:28 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1615.947152][ T2939] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1616.642424][ T2939] netdevsim netdevsim0 netdevsim1: renamed from eth1 16:34:29 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:30 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:30 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:30 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1617.945149][ T2939] netdevsim netdevsim0 netdevsim2: renamed from eth2 16:34:31 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:31 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:32 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:32 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:32 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1620.360006][ T2939] netdevsim netdevsim0 netdevsim3: renamed from eth3 16:34:33 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:34 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:34 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:35 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:35 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:36 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1623.358308][ T3098] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 16:34:36 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:36 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1624.417816][ T2939] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1624.465587][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1624.491583][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1624.519350][ T2939] 8021q: adding VLAN 0 to HW filter on device team0 [ 1624.542192][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1624.558146][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1624.577711][T23302] bridge0: port 1(bridge_slave_0) entered blocking state [ 1624.584807][T23302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1624.658047][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1624.666632][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1624.698069][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1624.717680][T31406] bridge0: port 2(bridge_slave_1) entered blocking state [ 1624.724793][T31406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1624.797963][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1624.808335][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1624.859539][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1624.870479][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1624.908863][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1624.940429][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1624.979187][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1624.998127][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1625.024393][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1625.053711][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1625.080643][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1625.101020][T23302] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 16:34:38 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:38 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:39 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:40 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:41 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1628.100713][ T3098] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 16:34:41 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1628.957639][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1628.965194][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1628.992709][ T2939] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1629.033230][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1629.047927][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 16:34:42 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1629.092050][ T2939] device veth0_vlan entered promiscuous mode [ 1629.128481][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1629.148059][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1629.183669][ T2939] device veth1_vlan entered promiscuous mode [ 1629.197965][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1629.219621][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1629.258290][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1629.280954][ T2760] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1629.364464][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1629.408042][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1629.419812][ T2939] device veth0_macvtap entered promiscuous mode [ 1629.469819][ T2939] device veth1_macvtap entered promiscuous mode [ 1629.503946][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.548333][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.587540][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:34:42 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1629.598343][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.619659][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.658531][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.687436][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.717487][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.743914][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.770174][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.807456][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.837475][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.857383][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.887441][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.917449][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1629.947492][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1629.984471][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1630.024984][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.060390][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1630.092179][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.128069][ T2939] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1630.149123][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1630.167891][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1630.188228][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1630.218210][T31826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1630.246046][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.277408][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.327402][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.347787][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.381671][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.420741][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:34:43 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1630.457318][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.477314][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.487162][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.557408][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.597497][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.617320][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.627209][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.667860][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.685774][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.736249][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.757341][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1630.808508][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.828648][ T2939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 16:34:43 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1630.857563][ T2939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1630.878843][ T2939] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1630.887396][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1630.896104][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1630.934279][ T2939] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1630.987335][ T2939] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1630.996081][ T2939] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1631.033356][ T2939] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 16:34:44 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1632.047973][ T3098] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 16:34:45 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:46 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:46 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:47 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:47 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:47 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1634.917606][ T7] Bluetooth: hci1: command 0x0406 tx timeout 16:34:48 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1635.258507][ T3098] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 16:34:48 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:48 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1636.548132][ T577] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1636.562711][ T577] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1636.661444][T31406] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1636.687493][T21154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1636.702683][T21154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1636.724942][ T3098] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1636.818147][ T3098] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1636.838559][ T3098] netdevsim netdevsim4 netdevsim2: renamed from eth2 16:34:49 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1636.873496][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1636.885189][ T3098] netdevsim netdevsim4 netdevsim3: renamed from eth3 16:34:50 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1637.152469][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1637.194695][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1637.205001][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1637.234194][ T3098] 8021q: adding VLAN 0 to HW filter on device team0 [ 1637.282178][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1637.291552][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1637.317976][ T3099] bridge0: port 1(bridge_slave_0) entered blocking state [ 1637.325076][ T3099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1637.388626][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1637.396687][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1637.418411][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1637.426853][T31830] bridge0: port 2(bridge_slave_1) entered blocking state [ 1637.434076][T31830] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1637.464511][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1637.488335][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1637.511811][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1637.521246][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1637.532727][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1637.543047][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1637.552126][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1637.560672][ T3099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1637.573425][ T3098] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1637.586854][ T3098] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1637.596046][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1637.604922][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1637.613735][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 16:34:50 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:51 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1638.808620][ T3098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1638.816726][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1638.829850][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 16:34:52 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:52 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1639.340465][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1639.349328][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1639.412011][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1639.427156][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1639.456856][ T3098] device veth0_vlan entered promiscuous mode [ 1639.499475][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1639.508487][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 16:34:52 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:52 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:52 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1639.568848][ T3098] device veth1_vlan entered promiscuous mode [ 1639.653143][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1639.667994][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1639.704535][ T3098] device veth0_macvtap entered promiscuous mode [ 1639.714635][ T3098] device veth1_macvtap entered promiscuous mode [ 1639.786521][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1639.827272][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1639.862040][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1639.901865][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1639.937567][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1639.975660][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.019129][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.038821][ T3704] Bluetooth: hci2: command 0x0406 tx timeout [ 1640.069512][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.094224][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.129880][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.168986][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.212660][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.235566][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 16:34:53 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:53 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1640.311115][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.347677][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.383103][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.421344][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.509627][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.537352][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.597356][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.627333][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1640.667786][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.692361][ T3098] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1640.728057][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1640.736396][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1640.765366][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 16:34:53 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex, r2, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1640.798087][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1640.823161][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1640.857446][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.886337][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1640.932024][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1640.967518][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1640.996520][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.031992][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.067983][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.105266][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.140430][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.174908][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 16:34:54 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1641.216923][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.247340][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.292614][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.325574][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.368647][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.428435][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.467717][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:34:54 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:54 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex, r2, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1641.486057][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.537370][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.555516][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1641.609079][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1641.637465][ T3098] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1641.645083][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1641.660594][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1641.705664][ T3098] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.730547][ T3098] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.755807][ T3098] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.797379][ T3098] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 16:34:55 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex, r2, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:55 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:55 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:34:55 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:56 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:56 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:56 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:57 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:57 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:57 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:57 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x0, 0x0}, 0x10) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex, r2, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1644.893309][ T1238] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1644.967484][ T1238] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1644.977777][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1645.029657][T21154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1645.067721][T21154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 16:34:58 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1645.076816][T31830] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 16:34:58 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:34:58 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:34:58 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:34:58 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:59 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:59 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:34:59 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x0, 0x0}, 0x10) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex, r2, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:59 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:59 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:34:59 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:00 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:00 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0x0, 0x0}, 0x10) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex, r2, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:00 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:01 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:01 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:01 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:01 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:02 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:02 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:35:02 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640), &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:02 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:03 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:03 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640), &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:03 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:03 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640), &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x10000000007ffd) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:04 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:04 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:05 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:05 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:05 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:06 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:06 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:06 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:07 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:07 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:07 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:35:07 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:07 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1655.387491][T31830] Bluetooth: hci4: command 0x0406 tx timeout 16:35:08 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:08 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:09 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:10 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1657.689320][ T3981] chnl_net:caif_netlink_parms(): no params data found 16:35:11 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:35:11 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:11 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:11 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:12 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:12 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1659.397439][ T7] Bluetooth: hci3: command 0x0409 tx timeout 16:35:12 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1659.901886][ T3981] bridge0: port 1(bridge_slave_0) entered blocking state [ 1659.927339][ T3981] bridge0: port 1(bridge_slave_0) entered disabled state [ 1659.935634][ T3981] device bridge_slave_0 entered promiscuous mode [ 1660.002205][ T3981] bridge0: port 2(bridge_slave_1) entered blocking state [ 1660.087575][ T3981] bridge0: port 2(bridge_slave_1) entered disabled state [ 1660.095882][ T3981] device bridge_slave_1 entered promiscuous mode 16:35:13 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1660.480205][ T3981] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1660.520588][ T3981] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 16:35:14 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1661.467443][T23302] Bluetooth: hci3: command 0x041b tx timeout 16:35:14 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1661.881041][ T3981] team0: Port device team_slave_0 added 16:35:15 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1662.272715][ T3981] team0: Port device team_slave_1 added 16:35:15 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:16 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:16 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1663.548409][T23302] Bluetooth: hci3: command 0x040f tx timeout 16:35:16 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:17 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:18 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:18 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:18 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1665.601812][ T3981] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1665.618742][ T3981] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 16:35:18 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1665.646564][T31826] Bluetooth: hci3: command 0x0419 tx timeout 16:35:18 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1665.732998][ T3981] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1665.781504][ T3981] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1665.817406][ T3981] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1665.927305][ T3981] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1668.668647][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1668.675013][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 16:35:21 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:22 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:24 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:26 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1675.113208][ T3981] device hsr_slave_0 entered promiscuous mode 16:35:28 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1675.620613][ T3981] device hsr_slave_1 entered promiscuous mode [ 1676.141523][ T3981] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1676.167305][ T3981] Cannot create hsr debugfs directory 16:35:32 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:33 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:36 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:37 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:39 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1688.277323][ T3703] Bluetooth: hci0: command 0x0409 tx timeout [ 1688.445688][ T3981] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 16:35:41 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1690.347425][ T3564] Bluetooth: hci0: command 0x041b tx timeout 16:35:43 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:35:44 executing program 1: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:35:44 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1692.427447][T23302] Bluetooth: hci0: command 0x040f tx timeout 16:35:46 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1693.768229][ T3981] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1694.507457][ T3564] Bluetooth: hci0: command 0x0419 tx timeout [ 1694.587376][ T3704] Bluetooth: hci1: command 0x0409 tx timeout [ 1694.827565][T31406] Bluetooth: hci4: command 0x0409 tx timeout 16:35:47 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:49 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1696.689680][T22507] Bluetooth: hci1: command 0x041b tx timeout [ 1696.907552][T22507] Bluetooth: hci4: command 0x041b tx timeout [ 1697.175819][ T3981] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 16:35:51 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1698.747701][ T3701] Bluetooth: hci1: command 0x040f tx timeout [ 1698.987434][T22507] Bluetooth: hci4: command 0x040f tx timeout 16:35:52 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1700.294011][ T3981] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1700.827377][T22507] Bluetooth: hci1: command 0x0419 tx timeout [ 1701.077368][T22507] Bluetooth: hci4: command 0x0419 tx timeout [ 1701.111691][ T4211] chnl_net:caif_netlink_parms(): no params data found 16:35:54 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 16:35:55 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 16:35:56 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 16:35:56 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) 16:35:57 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:35:58 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1706.111876][ T7841] device hsr_slave_0 left promiscuous mode 16:35:59 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1706.516688][ T7841] device hsr_slave_1 left promiscuous mode [ 1707.109152][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1707.116651][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 16:36:00 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1707.463667][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1707.471394][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1707.926911][ T7841] device bridge_slave_1 left promiscuous mode [ 1707.954584][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state 16:36:01 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1708.739294][ T7841] device bridge_slave_0 left promiscuous mode [ 1708.745586][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:02 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") 16:36:03 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") [ 1710.604140][ T7841] device hsr_slave_0 left promiscuous mode 16:36:04 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1711.291156][ T7841] device hsr_slave_1 left promiscuous mode 16:36:04 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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") [ 1711.968039][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1712.234374][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1712.400119][ T7841] device bridge_slave_1 left promiscuous mode [ 1712.406360][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state 16:36:05 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1712.920814][ T7841] device bridge_slave_0 left promiscuous mode [ 1712.937348][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state [ 1713.344267][ T7841] device bridge_slave_1 left promiscuous mode [ 1713.350590][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state 16:36:06 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1713.939669][ T7841] device bridge_slave_0 left promiscuous mode [ 1713.945921][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state [ 1713.999050][ T7841] device bridge_slave_0 left promiscuous mode [ 1714.005284][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:08 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:36:08 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1715.857750][ T7841] device hsr_slave_0 left promiscuous mode 16:36:09 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1716.515291][ T7841] device hsr_slave_1 left promiscuous mode [ 1717.192444][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1717.208582][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1717.411328][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1717.436013][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 16:36:10 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1717.856914][ T7841] device bridge_slave_1 left promiscuous mode [ 1717.872341][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state [ 1718.550397][ T7841] device bridge_slave_0 left promiscuous mode [ 1718.562689][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:11 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1719.053219][ T7841] device hsr_slave_0 left promiscuous mode [ 1719.062689][ T7841] device hsr_slave_1 left promiscuous mode [ 1719.659891][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1719.684144][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 16:36:13 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 1720.071525][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1720.089070][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1720.334998][ T7841] device bridge_slave_1 left promiscuous mode [ 1720.358862][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state 16:36:13 executing program 3: perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 1720.890155][ T7841] device bridge_slave_0 left promiscuous mode [ 1720.896417][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:14 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 16:36:15 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1722.830837][ T7841] device hsr_slave_0 left promiscuous mode 16:36:16 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1723.784883][ T7841] device hsr_slave_1 left promiscuous mode [ 1724.117578][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1724.126083][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1724.381728][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1724.410623][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1724.480727][ T7841] device bridge_slave_1 left promiscuous mode [ 1724.486949][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state [ 1724.861455][ T7841] device bridge_slave_0 left promiscuous mode [ 1724.887362][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:18 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1725.467316][T23302] Bluetooth: hci5: command 0x0409 tx timeout 16:36:18 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 1726.343977][ T7841] device hsr_slave_0 left promiscuous mode 16:36:19 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1726.994587][ T7841] device hsr_slave_1 left promiscuous mode 16:36:20 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1727.548139][ T3564] Bluetooth: hci5: command 0x041b tx timeout [ 1727.645236][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1727.656802][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1727.951618][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1727.977870][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 16:36:21 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1728.319604][ T7841] device bridge_slave_1 left promiscuous mode [ 1728.325928][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state [ 1729.017905][ T7841] device bridge_slave_0 left promiscuous mode [ 1729.024152][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state [ 1729.627568][T31830] Bluetooth: hci5: command 0x040f tx timeout [ 1729.851685][ T7841] device hsr_slave_0 left promiscuous mode 16:36:23 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1730.108801][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1730.115138][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 1730.297692][ T7841] device hsr_slave_1 left promiscuous mode [ 1730.667752][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1730.675601][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1730.928803][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1730.936390][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 16:36:24 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1731.259718][ T7841] device bridge_slave_1 left promiscuous mode [ 1731.265966][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state 16:36:24 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1731.707444][T31830] Bluetooth: hci5: command 0x0419 tx timeout [ 1731.788340][ T7841] device bridge_slave_0 left promiscuous mode [ 1731.797701][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:25 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1733.138719][ T7841] device hsr_slave_0 left promiscuous mode 16:36:26 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1733.687520][ T7841] device hsr_slave_1 left promiscuous mode 16:36:27 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1734.185819][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1734.207400][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1734.263952][ T7841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1734.277380][ T7841] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1734.300091][ T7841] device bridge_slave_1 left promiscuous mode [ 1734.306298][ T7841] bridge0: port 2(bridge_slave_1) entered disabled state [ 1734.938146][ T7841] device bridge_slave_0 left promiscuous mode [ 1734.947516][ T7841] bridge0: port 1(bridge_slave_0) entered disabled state 16:36:28 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:36:29 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1737.130939][ T7841] device veth1_macvtap left promiscuous mode [ 1737.137047][ T7841] device veth0_macvtap left promiscuous mode [ 1737.151055][ T7841] device veth1_vlan left promiscuous mode [ 1737.157139][ T7841] device veth0_vlan left promiscuous mode 16:36:30 executing program 3: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x0, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x1) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r2, r3, 0x19, 0x22, r1, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1738.137911][ T7841] device veth1_macvtap left promiscuous mode [ 1738.143990][ T7841] device veth0_macvtap left promiscuous mode [ 1738.159407][ T7841] device veth1_vlan left promiscuous mode [ 1738.167857][ T7841] device veth0_vlan left promiscuous mode 16:36:31 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1739.266432][ T7841] device veth1_macvtap left promiscuous mode [ 1739.278042][ T7841] device veth0_macvtap left promiscuous mode [ 1739.307301][ T7841] device veth1_vlan left promiscuous mode [ 1739.313133][ T7841] device veth0_vlan left promiscuous mode 16:36:33 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:36:33 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1741.617559][ T7841] device veth1_macvtap left promiscuous mode [ 1741.623656][ T7841] device veth0_macvtap left promiscuous mode [ 1741.650611][ T7841] device veth1_vlan left promiscuous mode [ 1741.656436][ T7841] device veth0_vlan left promiscuous mode 16:36:34 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:36:35 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) [ 1743.763133][ T7841] device veth1_macvtap left promiscuous mode [ 1743.777786][ T7841] device veth0_macvtap left promiscuous mode [ 1743.783888][ T7841] device veth1_vlan left promiscuous mode [ 1743.810812][ T7841] device veth0_vlan left promiscuous mode 16:36:37 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1744.288117][ T7841] device veth1_macvtap left promiscuous mode [ 1744.294174][ T7841] device veth0_macvtap left promiscuous mode [ 1744.327299][ T7841] device veth1_vlan left promiscuous mode [ 1744.337761][ T7841] device veth0_vlan left promiscuous mode [ 1746.193201][ T7841] device veth1_macvtap left promiscuous mode [ 1746.207800][ T7841] device veth0_macvtap left promiscuous mode [ 1746.213889][ T7841] device veth1_vlan left promiscuous mode [ 1746.237419][ T7841] device veth0_vlan left promiscuous mode [ 1754.187348][ T3099] Bluetooth: hci6: command 0x0409 tx timeout [ 1756.267402][T22507] Bluetooth: hci6: command 0x041b tx timeout [ 1758.357371][T22507] Bluetooth: hci6: command 0x040f tx timeout [ 1760.437360][ T3704] Bluetooth: hci6: command 0x0419 tx timeout 16:36:53 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1760.677341][T22507] Bluetooth: hci7: command 0x0409 tx timeout [ 1760.757420][T22507] Bluetooth: hci8: command 0x0409 tx timeout [ 1762.747574][ T3703] Bluetooth: hci7: command 0x041b tx timeout [ 1762.839504][ T3704] Bluetooth: hci8: command 0x041b tx timeout [ 1764.827345][T22507] Bluetooth: hci7: command 0x040f tx timeout [ 1764.907356][T22507] Bluetooth: hci8: command 0x040f tx timeout [ 1766.907468][T22507] Bluetooth: hci7: command 0x0419 tx timeout [ 1766.997331][T22507] Bluetooth: hci8: command 0x0419 tx timeout 16:37:05 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:37:10 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1783.387419][ T3703] Bluetooth: hci3: command 0x0406 tx timeout 16:37:16 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:17 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:18 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:37:19 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:37:20 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:37:22 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:22 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:23 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:37:24 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1791.478393][ T3703] Bluetooth: hci9: command 0x0409 tx timeout [ 1791.549195][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1791.555626][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 16:37:24 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:25 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:25 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:37:26 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1793.557384][ T3099] Bluetooth: hci9: command 0x041b tx timeout 16:37:27 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:28 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1795.636189][ T3564] Bluetooth: hci9: command 0x040f tx timeout 16:37:29 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1797.707555][ T3564] Bluetooth: hci9: command 0x0419 tx timeout 16:37:30 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:31 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:37:33 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:35 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1802.972709][ T7841] team0 (unregistering): Port device team_slave_1 removed 16:37:36 executing program 3: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1803.414057][ T7841] team0 (unregistering): Port device team_slave_0 removed [ 1803.627990][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 16:37:36 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1803.923641][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:37:37 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:38 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:38 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1805.698107][ T7841] bond0 (unregistering): Released all slaves 16:37:39 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:40 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:40 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:41 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1808.987495][T31830] Bluetooth: hci0: command 0x0406 tx timeout 16:37:42 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:37:42 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1810.082268][ T7841] team0 (unregistering): Port device team_slave_1 removed [ 1810.109941][ T7841] team0 (unregistering): Port device team_slave_0 removed [ 1810.165763][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 16:37:43 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1810.802171][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:37:44 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:44 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:45 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1812.686554][ T7841] bond0 (unregistering): Released all slaves 16:37:45 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="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") 16:37:46 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="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") [ 1814.210423][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 16:37:47 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)="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") [ 1815.161755][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:37:48 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0) 16:37:49 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:37:50 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") [ 1817.708058][ T7841] bond0 (unregistering): Released all slaves 16:37:51 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:51 executing program 3: syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:52 executing program 3: syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1819.228018][ T3564] Bluetooth: hci4: command 0x0406 tx timeout [ 1819.234083][ T3564] Bluetooth: hci1: command 0x0406 tx timeout 16:37:53 executing program 3: syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") [ 1819.908623][ T7841] bond0 (unregistering): Released all slaves [ 1820.267392][T31830] Bluetooth: hci10: command 0x0409 tx timeout 16:37:53 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:37:54 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:37:54 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:37:55 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1822.358436][ T3703] Bluetooth: hci10: command 0x041b tx timeout 16:37:55 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:37:56 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1823.608576][ T7841] team0 (unregistering): Port device team_slave_1 removed 16:37:56 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1823.808048][ T7841] team0 (unregistering): Port device team_slave_0 removed 16:37:57 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1824.315827][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1824.436532][ T3703] Bluetooth: hci10: command 0x040f tx timeout 16:37:58 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1824.974227][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:37:58 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:37:59 executing program 3: syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") 16:37:59 executing program 3: syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") [ 1826.488072][ T7841] bond0 (unregistering): Released all slaves [ 1826.517375][T22507] Bluetooth: hci10: command 0x0419 tx timeout [ 1826.667271][T22507] Bluetooth: hci11: command 0x0409 tx timeout [ 1826.827551][ T3564] Bluetooth: hci12: command 0x0409 tx timeout 16:38:00 executing program 3: syz_clone(0x0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:01 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1828.757346][ T3704] Bluetooth: hci11: command 0x041b tx timeout [ 1828.917270][ T3704] Bluetooth: hci12: command 0x041b tx timeout 16:38:02 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:02 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000002c0), 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:38:03 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1830.357990][ T7841] team0 (unregistering): Port device team_slave_1 removed [ 1830.379098][ T7841] team0 (unregistering): Port device team_slave_0 removed [ 1830.410806][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1830.436071][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1830.837321][ T3704] Bluetooth: hci11: command 0x040f tx timeout [ 1830.987407][ T3704] Bluetooth: hci12: command 0x040f tx timeout 16:38:04 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:04 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1831.886389][ T7841] bond0 (unregistering): Released all slaves 16:38:05 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:05 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1832.916365][ T3704] Bluetooth: hci11: command 0x0419 tx timeout [ 1833.067401][ T3704] Bluetooth: hci12: command 0x0419 tx timeout 16:38:06 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:06 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:07 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:38:07 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:08 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1835.504918][ T7841] team0 (unregistering): Port device team_slave_1 removed [ 1835.583165][ T7841] team0 (unregistering): Port device team_slave_0 removed [ 1836.118175][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 16:38:09 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1836.600206][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:38:10 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:38:10 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:38:10 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1838.738045][ T7841] bond0 (unregistering): Released all slaves 16:38:12 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:38:12 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) 16:38:13 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:38:13 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:15 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1844.003951][ T7841] team0 (unregistering): Port device team_slave_1 removed [ 1844.147896][ T7841] team0 (unregistering): Port device team_slave_0 removed 16:38:17 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r3, r4, 0x19, 0x22, r2, @prog_id}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1844.556028][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 16:38:18 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:38:18 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) [ 1845.427888][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:38:19 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) r7 = syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) 16:38:19 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") [ 1847.065818][ T7841] bond0 (unregistering): Released all slaves 16:38:20 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x40, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x4012, 0x100000001, 0xffffff3a, 0x6, 0x2, 0x6a, 0x7, 0x0, 0x5, 0x0, 0x5}, r1, 0x0, r0, 0xb) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:21 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, r5, 0x19, 0x22, r3, @prog_id=r6}, 0x20) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="04802cd03a8a8b07b4f95b6e49b35daab14746a979cc55268f22dfea1f056285c7836ffe07d04cdfe1f59a51d7edffd2db726e1e4165c42c65893462344d1bd683c5a1b63f305e892ce4d6259faab7133991432c56c70951c95ad988cdf190cf7b1315569b117dda4f3f50128977e5935442292e1693508de0ee68c70e47d1ad4c5af8ae91f845aec7edb6a405976242475ecfefa214d35056e49a289327ab450fa16d3813c0de93df6b5914879f22a080b3e7867a9bab55b9945f9727e2d0d7c2066a8730edf3d207a3ab7f9ac81e9a9563cef91e61202780a78dda3ee808683733e539cb41b929ffc28c53b0c2797f954159e5d48ca15b8db69bbb2850") 16:38:21 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") 16:38:22 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1849.947226][ T3099] Bluetooth: hci5: command 0x0406 tx timeout 16:38:23 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1850.582776][ T7841] team0 (unregistering): Port device team_slave_1 removed [ 1850.960258][ T7841] team0 (unregistering): Port device team_slave_0 removed [ 1851.266575][ T7841] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1851.866115][ T7841] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:38:25 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1852.988871][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1852.995208][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 1855.191501][ T7841] bond0 (unregistering): Released all slaves 16:38:28 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1855.547923][ T27] INFO: task kworker/1:4:31406 blocked for more than 143 seconds. [ 1855.556038][ T27] Not tainted 5.15.151-syzkaller #0 [ 1855.561935][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1855.588373][ T27] task:kworker/1:4 state:D stack:24824 pid:31406 ppid: 2 flags:0x00004000 [ 1855.607177][ T27] Workqueue: events_power_efficient reg_check_chans_work [ 1855.614403][ T27] Call Trace: [ 1855.627177][ T27] [ 1855.630234][ T27] __schedule+0x12c4/0x45b0 [ 1855.634974][ T27] ? mark_lock+0x98/0x340 [ 1855.642951][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1855.657188][ T27] ? __sched_text_start+0x8/0x8 [ 1855.662092][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1855.677185][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1855.682468][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1855.688095][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1855.693401][ T27] schedule+0x11b/0x1f0 [ 1855.707525][ T27] schedule_preempt_disabled+0xf/0x20 [ 1855.713016][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1855.718683][ T27] ? reg_check_chans_work+0x7f/0xb70 [ 1855.724007][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1855.737223][ T27] mutex_lock_nested+0x17/0x20 [ 1855.742046][ T27] reg_check_chans_work+0x7f/0xb70 [ 1855.747908][ T27] ? read_lock_is_recursive+0x10/0x10 [ 1855.753314][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1855.767211][ T27] ? reg_process_ht_flags+0xba0/0xba0 [ 1855.772623][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1855.787189][ T27] process_one_work+0x8a1/0x10c0 [ 1855.792254][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1855.806423][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1855.817177][ T27] ? kthread_data+0x4e/0xc0 [ 1855.821765][ T27] ? wq_worker_running+0x97/0x170 [ 1855.826816][ T27] worker_thread+0xaca/0x1280 [ 1855.837182][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1855.843229][ T27] kthread+0x3f6/0x4f0 [ 1855.853305][ T27] ? rcu_lock_release+0x20/0x20 [ 1855.867244][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1855.871889][ T27] ret_from_fork+0x1f/0x30 [ 1855.876381][ T27] [ 1855.879937][ T27] INFO: task kworker/1:5:31826 blocked for more than 143 seconds. [ 1855.888155][ T27] Not tainted 5.15.151-syzkaller #0 [ 1855.893890][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1855.915102][ T27] task:kworker/1:5 state:D stack:24824 pid:31826 ppid: 2 flags:0x00004000 [ 1855.937204][ T27] Workqueue: events linkwatch_event [ 1855.942557][ T27] Call Trace: [ 1855.945844][ T27] [ 1855.949781][ T27] __schedule+0x12c4/0x45b0 [ 1855.954374][ T27] ? mark_lock+0x98/0x340 [ 1855.959207][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1855.965223][ T27] ? __sched_text_start+0x8/0x8 [ 1855.976342][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1855.987190][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1855.992427][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1856.007179][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1856.012431][ T27] schedule+0x11b/0x1f0 [ 1856.016684][ T27] schedule_preempt_disabled+0xf/0x20 [ 1856.027171][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1856.032410][ T27] ? linkwatch_event+0xa/0x50 [ 1856.047183][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1856.052600][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1856.059029][ T27] ? print_irqtrace_events+0x210/0x210 [ 1856.064512][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1856.077190][ T27] mutex_lock_nested+0x17/0x20 [ 1856.081991][ T27] linkwatch_event+0xa/0x50 [ 1856.086516][ T27] process_one_work+0x8a1/0x10c0 [ 1856.102894][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1856.109161][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1856.114740][ T27] ? kthread_data+0x4e/0xc0 [ 1856.127196][ T27] ? wq_worker_running+0x97/0x170 [ 1856.132293][ T27] worker_thread+0xaca/0x1280 [ 1856.137026][ T27] kthread+0x3f6/0x4f0 [ 1856.148324][ T27] ? rcu_lock_release+0x20/0x20 [ 1856.153421][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1856.167182][ T27] ret_from_fork+0x1f/0x30 [ 1856.171668][ T27] [ 1856.180208][ T27] INFO: task kworker/0:15:3701 blocked for more than 143 seconds. [ 1856.188154][ T27] Not tainted 5.15.151-syzkaller #0 [ 1856.194193][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1856.217168][ T27] task:kworker/0:15 state:D stack:27424 pid: 3701 ppid: 2 flags:0x00004000 [ 1856.226472][ T27] Workqueue: events switchdev_deferred_process_work [ 1856.233572][ T27] Call Trace: [ 1856.236858][ T27] [ 1856.247175][ T27] __schedule+0x12c4/0x45b0 [ 1856.251763][ T27] ? mark_lock+0x98/0x340 [ 1856.256479][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1856.264279][ T27] ? __sched_text_start+0x8/0x8 [ 1856.277171][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1856.282721][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1856.288422][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1856.293651][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1856.299311][ T27] schedule+0x11b/0x1f0 [ 1856.303490][ T27] schedule_preempt_disabled+0xf/0x20 [ 1856.317248][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1856.322539][ T27] ? switchdev_deferred_process_work+0xa/0x20 [ 1856.328993][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1856.334218][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1856.347181][ T27] ? print_irqtrace_events+0x210/0x210 [ 1856.352770][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1856.359229][ T27] mutex_lock_nested+0x17/0x20 16:38:29 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1856.364028][ T27] switchdev_deferred_process_work+0xa/0x20 [ 1856.385843][ T27] process_one_work+0x8a1/0x10c0 [ 1856.391241][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1856.407196][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1856.412781][ T27] ? kthread_data+0x4e/0xc0 [ 1856.437252][ T27] ? wq_worker_running+0x97/0x170 [ 1856.442323][ T27] worker_thread+0xaca/0x1280 [ 1856.447047][ T27] kthread+0x3f6/0x4f0 [ 1856.477167][ T27] ? rcu_lock_release+0x20/0x20 [ 1856.482189][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1856.486804][ T27] ret_from_fork+0x1f/0x30 [ 1856.507184][ T27] [ 1856.510345][ T27] INFO: task syz-executor.4:3981 blocked for more than 144 seconds. [ 1856.527185][ T27] Not tainted 5.15.151-syzkaller #0 [ 1856.532928][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1856.557335][ T27] task:syz-executor.4 state:D stack:21624 pid: 3981 ppid: 1 flags:0x00004006 [ 1856.566735][ T27] Call Trace: [ 1856.571781][ T27] [ 1856.574743][ T27] __schedule+0x12c4/0x45b0 [ 1856.579694][ T27] ? __sched_text_start+0x8/0x8 [ 1856.584564][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1856.590672][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1856.595909][ T27] schedule+0x11b/0x1f0 [ 1856.601605][ T27] schedule_preempt_disabled+0xf/0x20 [ 1856.607007][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1856.612605][ T27] ? unregister_nexthop_notifier+0x78/0x210 [ 1856.627286][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1856.632615][ T27] ? synchronize_rcu+0x107/0x1a0 [ 1856.638110][ T27] ? kvfree_call_rcu+0x8a0/0x8a0 [ 1856.643077][ T27] mutex_lock_nested+0x17/0x20 [ 1856.657202][ T27] unregister_nexthop_notifier+0x78/0x210 [ 1856.662957][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 1856.669832][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1856.675059][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1856.686168][ T27] ? register_nexthop_notifier+0x270/0x270 [ 1856.692335][ T27] ? atomic_notifier_chain_unregister+0xef/0x100 [ 1856.707242][ T27] nsim_fib_destroy+0x85/0x180 [ 1856.712140][ T27] nsim_dev_reload_destroy+0x1cf/0x240 [ 1856.719108][ T27] nsim_dev_remove+0x59/0x100 [ 1856.723812][ T27] ? nsim_bus_probe+0x20/0x20 [ 1856.737191][ T27] device_release_driver_internal+0x4cb/0x7f0 [ 1856.743412][ T27] bus_remove_device+0x2e5/0x400 [ 1856.749052][ T27] device_del+0x6e2/0xbd0 [ 1856.753421][ T27] ? del_device_store+0xf1/0x470 [ 1856.767185][ T27] ? kill_device+0x160/0x160 [ 1856.771984][ T27] device_unregister+0x1c/0xc0 [ 1856.776774][ T27] del_device_store+0x321/0x470 [ 1856.787196][ T27] ? del_port_store+0x270/0x270 [ 1856.792095][ T27] ? sysfs_kf_write+0x181/0x2a0 [ 1856.797083][ T27] ? sysfs_kf_read+0x300/0x300 [ 1856.806661][ T27] kernfs_fop_write_iter+0x3a2/0x4f0 [ 1856.817188][ T27] vfs_write+0xacf/0xe50 [ 1856.821549][ T27] ? file_end_write+0x250/0x250 [ 1856.826453][ T27] ? read_lock_is_recursive+0x10/0x10 [ 1856.847218][ T27] ? __fdget_pos+0x2d2/0x380 [ 1856.852005][ T27] ksys_write+0x1a2/0x2c0 [ 1856.856359][ T27] ? print_irqtrace_events+0x210/0x210 [ 1856.867242][ T27] ? __ia32_sys_read+0x80/0x80 [ 1856.874594][ T27] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1856.883316][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1856.891143][ T27] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1856.900147][ T27] do_syscall_64+0x3d/0xb0 [ 1856.904627][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1856.915990][ T27] RIP: 0033:0x7f0661a36aef [ 1856.922942][ T27] RSP: 002b:00007ffdde54b060 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1856.933947][ T27] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f0661a36aef [ 1856.946992][ T27] RDX: 0000000000000001 RSI: 00007ffdde54b0b0 RDI: 0000000000000005 [ 1856.958707][ T27] RBP: 00007f0661a84021 R08: 0000000000000000 R09: 00007ffdde54aeb7 [ 1856.966703][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1856.982054][ T27] R13: 00007ffdde54b0b0 R14: 00007f066268e620 R15: 0000000000000003 [ 1856.994101][ T27] [ 1857.007421][ T27] INFO: task syz-executor.2:4211 blocked for more than 144 seconds. [ 1857.015419][ T27] Not tainted 5.15.151-syzkaller #0 [ 1857.030475][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1857.042853][ T27] task:syz-executor.2 state:D stack:21624 pid: 4211 ppid: 1 flags:0x00004006 [ 1857.056941][ T27] Call Trace: [ 1857.061641][ T27] [ 1857.064616][ T27] __schedule+0x12c4/0x45b0 [ 1857.073026][ T27] ? __sched_text_start+0x8/0x8 [ 1857.080890][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1857.086393][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1857.095340][ T27] schedule+0x11b/0x1f0 [ 1857.100959][ T27] schedule_preempt_disabled+0xf/0x20 [ 1857.106354][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1857.116509][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1857.124121][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1857.130715][ T27] mutex_lock_nested+0x17/0x20 [ 1857.135500][ T27] rtnetlink_rcv_msg+0x94c/0xee0 [ 1857.145331][ T27] ? reacquire_held_locks+0x660/0x660 [ 1857.152199][ T27] ? rtnetlink_bind+0x80/0x80 [ 1857.156903][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1857.167213][ T27] ? __kernel_text_address+0x94/0x100 [ 1857.172670][ T27] ? unwind_get_return_address+0x49/0x80 [ 1857.184208][ T27] ? reacquire_held_locks+0x660/0x660 [ 1857.192172][ T27] ? arch_stack_walk+0xf3/0x140 [ 1857.199623][ T27] ? mark_lock+0x98/0x340 [ 1857.203989][ T27] ? mark_lock+0x98/0x340 [ 1857.212188][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1857.218667][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1857.223568][ T27] ? rtnetlink_bind+0x80/0x80 [ 1857.232061][ T27] ? netlink_ack+0xb10/0xb10 [ 1857.236771][ T27] netlink_unicast+0x7b6/0x980 [ 1857.246568][ T27] ? netlink_detachskb+0x90/0x90 [ 1857.252946][ T27] ? __virt_addr_valid+0x39e/0x450 [ 1857.260643][ T27] ? 0xffffffff81000000 [ 1857.264813][ T27] ? __check_object_size+0x300/0x410 [ 1857.275085][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1857.282999][ T27] netlink_sendmsg+0xa30/0xd60 [ 1857.294357][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1857.302150][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1857.311182][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1857.316502][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1857.329217][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1857.334556][ T27] __sys_sendto+0x564/0x720 [ 1857.346394][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1857.355488][ T27] ? print_irqtrace_events+0x210/0x210 [ 1857.364726][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1857.373689][ T27] __x64_sys_sendto+0xda/0xf0 [ 1857.383195][ T27] do_syscall_64+0x3d/0xb0 [ 1857.391506][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1857.401171][ T27] RIP: 0033:0x7f8687fffa9c [ 1857.405605][ T27] RSP: 002b:00007ffc940648c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1857.421299][ T27] RAX: ffffffffffffffda RBX: 00007f8688c54620 RCX: 00007f8687fffa9c [ 1857.434261][ T27] RDX: 0000000000000028 RSI: 00007f8688c54670 RDI: 0000000000000003 [ 1857.447043][ T27] RBP: 0000000000000000 R08: 00007ffc94064914 R09: 000000000000000c [ 1857.459848][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1857.471409][ T27] R13: 0000000000000000 R14: 00007f8688c54670 R15: 0000000000000000 [ 1857.484788][ T27] [ 1857.498019][ T27] INFO: task syz-executor.0:4250 blocked for more than 145 seconds. [ 1857.506017][ T27] Not tainted 5.15.151-syzkaller #0 [ 1857.517234][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1857.525926][ T27] task:syz-executor.0 state:D stack:21624 pid: 4250 ppid: 1 flags:0x00004006 [ 1857.547187][ T27] Call Trace: [ 1857.547257][T31830] Bluetooth: hci13: command 0x0409 tx timeout [ 1857.550515][ T27] [ 1857.559684][ T27] __schedule+0x12c4/0x45b0 [ 1857.564249][ T27] ? __sched_text_start+0x8/0x8 16:38:30 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xf0, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1857.577198][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1857.582789][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1857.589494][ T27] schedule+0x11b/0x1f0 [ 1857.593684][ T27] schedule_preempt_disabled+0xf/0x20 [ 1857.637563][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1857.642834][ T27] ? rtnl_newlink+0xae9/0x2070 [ 1857.657170][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1857.662413][ T27] ? nla_strscpy+0xf9/0x170 [ 1857.667006][ T27] ? memset+0x1f/0x40 [ 1857.687318][ T27] mutex_lock_nested+0x17/0x20 [ 1857.692294][ T27] rtnl_newlink+0xae9/0x2070 [ 1857.696915][ T27] ? rtnl_newlink+0x531/0x2070 [ 1857.718573][ T27] ? rtnl_newlink+0x531/0x2070 [ 1857.723401][ T27] ? rtnl_setlink+0x540/0x540 [ 1857.737250][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1857.742421][ T27] ? rtnl_setlink+0x540/0x540 [ 1857.757198][ T27] rtnetlink_rcv_msg+0x993/0xee0 [ 1857.762302][ T27] ? reacquire_held_locks+0x660/0x660 [ 1857.768433][ T27] ? rtnetlink_bind+0x80/0x80 [ 1857.773139][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1857.778536][ T27] ? __kernel_text_address+0x94/0x100 [ 1857.783934][ T27] ? unwind_get_return_address+0x49/0x80 [ 1857.797167][ T27] ? reacquire_held_locks+0x660/0x660 [ 1857.802672][ T27] ? arch_stack_walk+0xf3/0x140 [ 1857.808886][ T27] ? mark_lock+0x98/0x340 [ 1857.813247][ T27] ? mark_lock+0x98/0x340 [ 1857.827179][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1857.832468][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1857.838851][ T27] ? rtnetlink_bind+0x80/0x80 [ 1857.843587][ T27] ? netlink_ack+0xb10/0xb10 [ 1857.848668][ T27] netlink_unicast+0x7b6/0x980 [ 1857.853464][ T27] ? netlink_detachskb+0x90/0x90 [ 1857.875112][ T27] ? __virt_addr_valid+0x39e/0x450 [ 1857.880691][ T27] ? 0xffffffff81000000 [ 1857.884867][ T27] ? __check_object_size+0x300/0x410 [ 1857.890670][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1857.902457][ T27] netlink_sendmsg+0xa30/0xd60 [ 1857.907612][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1857.912846][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1857.927224][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1857.932549][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1857.939416][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1857.944656][ T27] __sys_sendto+0x564/0x720 [ 1857.950778][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1857.956236][ T27] ? rcu_is_watching+0x11/0xa0 [ 1857.967180][ T27] ? print_irqtrace_events+0x210/0x210 [ 1857.972697][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1857.987237][ T27] __x64_sys_sendto+0xda/0xf0 [ 1857.991959][ T27] do_syscall_64+0x3d/0xb0 [ 1857.996555][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1858.003064][ T27] RIP: 0033:0x7f45ad75ba9c [ 1858.007872][ T27] RSP: 002b:00007ffea5c34110 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1858.016320][ T27] RAX: ffffffffffffffda RBX: 00007f45ae3b0620 RCX: 00007f45ad75ba9c [ 1858.037300][ T27] RDX: 000000000000003c RSI: 00007f45ae3b0670 RDI: 0000000000000003 [ 1858.045313][ T27] RBP: 0000000000000000 R08: 00007ffea5c34164 R09: 000000000000000c [ 1858.058196][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1858.066189][ T27] R13: 0000000000000000 R14: 00007f45ae3b0670 R15: 0000000000000000 [ 1858.081105][ T27] [ 1858.084181][ T27] INFO: task syz-executor.1:4255 blocked for more than 145 seconds. [ 1858.097170][ T27] Not tainted 5.15.151-syzkaller #0 [ 1858.103044][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1858.118622][ T27] task:syz-executor.1 state:D stack:21624 pid: 4255 ppid: 1 flags:0x00004006 [ 1858.134327][ T27] Call Trace: [ 1858.140165][ T27] [ 1858.143121][ T27] __schedule+0x12c4/0x45b0 [ 1858.152582][ T27] ? __sched_text_start+0x8/0x8 [ 1858.162362][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1858.172729][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1858.183994][ T27] schedule+0x11b/0x1f0 [ 1858.192047][ T27] schedule_preempt_disabled+0xf/0x20 [ 1858.201488][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1858.215384][ T27] ? rtnetlink_rcv_msg+0x94c/0xee0 [ 1858.226664][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1858.236945][ T27] mutex_lock_nested+0x17/0x20 [ 1858.261181][ T27] rtnetlink_rcv_msg+0x94c/0xee0 [ 1858.277356][ T27] ? reacquire_held_locks+0x660/0x660 [ 1858.282795][ T27] ? rtnetlink_bind+0x80/0x80 [ 1858.317168][ T27] ? stack_trace_save+0x1c0/0x1c0 [ 1858.322249][ T27] ? __kernel_text_address+0x94/0x100 [ 1858.331700][ T27] ? unwind_get_return_address+0x49/0x80 [ 1858.338770][ T27] ? reacquire_held_locks+0x660/0x660 [ 1858.344165][ T27] ? arch_stack_walk+0xf3/0x140 [ 1858.367384][ T27] ? mark_lock+0x98/0x340 [ 1858.371765][ T27] ? mark_lock+0x98/0x340 [ 1858.376120][ T27] ? __lock_acquire+0x1295/0x1ff0 [ 1858.398412][ T27] netlink_rcv_skb+0x1cf/0x410 [ 1858.403227][ T27] ? rtnetlink_bind+0x80/0x80 [ 1858.417220][ T27] ? netlink_ack+0xb10/0xb10 [ 1858.421946][ T27] netlink_unicast+0x7b6/0x980 [ 1858.426730][ T27] ? netlink_detachskb+0x90/0x90 [ 1858.448817][ T27] ? __virt_addr_valid+0x39e/0x450 [ 1858.454002][ T27] ? 0xffffffff81000000 [ 1858.479520][ T27] ? __check_object_size+0x300/0x410 [ 1858.484863][ T27] ? bpf_lsm_netlink_send+0x5/0x10 [ 1858.509672][ T27] netlink_sendmsg+0xa30/0xd60 [ 1858.514496][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1858.523620][ T27] ? aa_sock_msg_perm+0x91/0x150 [ 1858.540833][ T27] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1858.546162][ T27] ? security_socket_sendmsg+0x7d/0xa0 [ 1858.569523][ T27] ? netlink_getsockopt+0x5b0/0x5b0 [ 1858.574783][ T27] __sys_sendto+0x564/0x720 [ 1858.587614][ T27] ? __ia32_sys_getpeername+0x80/0x80 [ 1858.593047][ T27] ? print_irqtrace_events+0x210/0x210 [ 1858.620859][ T27] ? vtime_user_exit+0x2d1/0x400 [ 1858.625846][ T27] __x64_sys_sendto+0xda/0xf0 [ 1858.637242][ T27] do_syscall_64+0x3d/0xb0 [ 1858.641699][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1858.658304][ T27] RIP: 0033:0x7fbff90cca9c [ 1858.662786][ T27] RSP: 002b:00007fff34808080 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 1858.689633][ T27] RAX: ffffffffffffffda RBX: 00007fbff9d21620 RCX: 00007fbff90cca9c [ 1858.707210][ T27] RDX: 0000000000000038 RSI: 00007fbff9d21670 RDI: 0000000000000003 [ 1858.715351][ T27] RBP: 0000000000000000 R08: 00007fff348080d4 R09: 000000000000000c [ 1858.739546][ T27] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 1858.758289][ T27] R13: 0000000000000000 R14: 00007fbff9d21670 R15: 0000000000000000 [ 1858.766313][ T27] [ 1858.787212][ T27] [ 1858.787212][ T27] Showing all locks held in the system: [ 1858.794973][ T27] 2 locks held by kworker/0:0/7: [ 1858.817289][ T27] #0: ffff888011c72138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1858.837173][ T27] #1: ffffc90000cc7d20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1858.867573][ T27] 1 lock held by khungtaskd/27: [ 1858.872460][ T27] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 16:38:31 executing program 3: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0xcf, 0x2, 0x0, 0x40000000000000, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x180005, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x5, 0x8, 0x6, 0x0, 0x1afc, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x7, @perf_config_ext={0x7, 0xff}, 0x107918, 0x8000000000000000, 0x8, 0x6, 0x51b, 0x0, 0x81, 0x0, 0x3, 0x0, 0x2}, r1, 0x10, r0, 0x1) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r2, 0x0, 0x12, &(0x7f0000000980)='./cgroup.cpu/syz0\x00'}, 0x30) syz_clone(0x80000000, &(0x7f00000002c0)="9744872960c4a4a9328fbea11ce04f1a2ffd4f7efff5b8b631344052c890fe1c57e675d8a7fe67dfb24cd5d3bbaf4a2e973b2ddc1cf3176472f9605a826673141afb30f04e69e81112d449ad916f9d44de6127a944dac751800ecfe5e13116a0f9c8392abd61bfd2bc2698887fef1190e327074f2979bf8a168218539c0c4ca10afd6730db7fbb9aa11edda653fe57ad39628ff4b06393c26604040c5e27b0bc06e99ffdb43f6987eea9382c16938428e6fc1e0ca5bf7971724c0ff1bd7e169e88bdaeafab", 0xc5, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="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") [ 1858.899583][ T27] 2 locks held by getty/3261: [ 1858.904291][ T27] #0: ffff88814acb4098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1858.955812][ T27] #1: ffffc90002bab2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1858.977389][ T27] 4 locks held by kworker/1:6/3564: [ 1858.982709][ T27] #0: ffff8880b9b3a318 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 1859.007375][ T27] #1: ffff8880b9b27848 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x53d/0x810 [ 1859.020628][ T27] #2: ffff8880b9b27e78 (krc.lock){..-.}-{2:2}, at: kfree_rcu_monitor+0x29/0x6c0 [ 1859.031496][ T27] #3: ffff8880b9b28098 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x120/0x260 [ 1859.041195][ T27] 5 locks held by kworker/u4:5/7841: [ 1859.046500][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1859.057248][ T27] #1: ffffc9000efa7d20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1859.077296][ T27] #2: ffffffff8d9cfd50 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1859.086759][ T27] #3: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x1ac/0x3f0 [ 1859.098018][ T27] #4: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x280/0x740 [ 1859.109273][ T27] 3 locks held by kworker/1:4/31406: [ 1859.114564][ T27] #0: ffff888011c71938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1859.137115][ T27] #1: ffffc90004557d20 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1859.177169][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x7f/0xb70 [ 1859.186801][ T27] 3 locks held by kworker/1:5/31826: [ 1859.207982][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1859.227158][ T27] #1: ffffc90009dffd20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1859.247157][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1859.256172][ T27] 3 locks held by kworker/0:15/3701: [ 1859.277277][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1859.297766][ T27] #1: ffffc90002d37d20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1859.308644][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1859.327278][ T27] 3 locks held by kworker/0:17/3703: [ 1859.332741][ T27] #0: ffff88814a988938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1859.357240][ T27] #1: ffffc90002db7d20 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1859.367930][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 1859.377823][ T27] 6 locks held by syz-executor.4/3981: [ 1859.383301][ T27] #0: ffff88807ef34460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x29a/0xe50 [ 1859.407876][ T27] #1: ffff88801fcfbc88 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0 [ 1859.418094][ T27] #2: ffff88801e65aa00 (kn->active#233){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0 [ 1859.437174][ T27] #3: ffffffff8d357ac8 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xf1/0x470 [ 1859.447954][ T27] #4: ffff88807835c178 (&dev->mutex){....}-{3:3}, at: device_release_driver_internal+0xc2/0x7f0 [ 1859.467179][ T27] #5: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: unregister_nexthop_notifier+0x78/0x210 [ 1859.487180][ T27] 1 lock held by syz-executor.2/4211: [ 1859.492620][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1859.502488][ T27] 1 lock held by syz-executor.0/4250: [ 1859.508250][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_newlink+0xae9/0x2070 [ 1859.527167][ T27] 1 lock held by syz-executor.1/4255: [ 1859.533593][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1859.547164][ T27] 1 lock held by syz-executor.4/4446: [ 1859.552799][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1859.567181][ T27] 1 lock held by syz-executor.2/4520: [ 1859.572574][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1859.587175][ T27] 1 lock held by syz-executor.0/4527: [ 1859.592606][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1859.607169][ T27] 1 lock held by syz-executor.1/4531: [ 1859.612605][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1859.627171][ T27] 1 lock held by syz-executor.4/4568: [ 1859.627227][ T3564] Bluetooth: hci13: command 0x041b tx timeout [ 1859.632553][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1859.655434][ T27] 1 lock held by syz-executor.2/4887: [ 1859.667171][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1859.676701][ T27] 1 lock held by syz-executor.0/4929: [ 1859.697172][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1859.706777][ T27] 1 lock held by syz-executor.1/4933: [ 1859.713099][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1859.727170][ T27] 2 locks held by syz-executor.3/4956: [ 1859.732696][ T27] 2 locks held by syz-executor.3/4966: [ 1859.747660][ T27] 2 locks held by syz-executor.3/4969: [ 1859.753153][ T27] 2 locks held by syz-executor.3/4973: [ 1859.760362][ T27] 2 locks held by syz-executor.3/4976: [ 1859.765840][ T27] 2 locks held by syz-executor.3/4979: [ 1859.777184][ T27] 2 locks held by syz-executor.3/4982: [ 1859.782660][ T27] 3 locks held by syz-executor.3/4986: [ 1859.797216][ T27] 3 locks held by syz-executor.3/4989: [ 1859.802695][ T27] 2 locks held by syz-executor.3/4993: [ 1859.817178][ T27] 2 locks held by syz-executor.3/4997: [ 1859.822663][ T27] 2 locks held by syz-executor.3/5000: [ 1859.828650][ T27] 2 locks held by syz-executor.3/5039: [ 1859.834125][ T27] 2 locks held by syz-executor.3/5043: [ 1859.847171][ T27] 2 locks held by syz-executor.3/5046: [ 1859.852683][ T27] 3 locks held by syz-executor.3/5050: [ 1859.858665][ T27] 3 locks held by syz-executor.3/5157: [ 1859.864130][ T27] 3 locks held by syz-executor.3/5160: [ 1859.877166][ T27] 2 locks held by syz-executor.3/5165: [ 1859.882682][ T27] 2 locks held by syz-executor.3/5169: [ 1859.897187][ T27] 2 locks held by syz-executor.3/5174: [ 1859.902720][ T27] 2 locks held by syz-executor.3/5177: [ 1859.908612][ T27] 4 locks held by syz-executor.3/5180: [ 1859.914088][ T27] 1 lock held by syz-executor.3/5183: [ 1859.927168][ T27] 1 lock held by syz-executor.4/5393: [ 1859.932584][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1859.943970][ T27] 2 locks held by syz-executor.3/5399: [ 1859.971603][ T27] [ 1859.973986][ T27] ============================================= [ 1859.973986][ T27] [ 1859.984547][ T27] NMI backtrace for cpu 0 [ 1859.988891][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0 [ 1859.996879][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1860.006941][ T27] Call Trace: [ 1860.010229][ T27] [ 1860.013170][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1860.017872][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1860.023523][ T27] ? panic+0x84d/0x84d [ 1860.027606][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1860.032798][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 1860.037768][ T27] ? __wake_up_klogd+0xd5/0x100 [ 1860.042659][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1860.048828][ T27] ? _printk+0xd1/0x111 [ 1860.053007][ T27] ? panic+0x84d/0x84d [ 1860.057083][ T27] ? __wake_up_klogd+0xcc/0x100 [ 1860.061947][ T27] ? panic+0x84d/0x84d [ 1860.066040][ T27] ? __rcu_read_unlock+0x92/0x100 [ 1860.071082][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1860.077229][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1860.083231][ T27] watchdog+0xe72/0xeb0 [ 1860.087501][ T27] kthread+0x3f6/0x4f0 [ 1860.091598][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1860.096678][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1860.101275][ T27] ret_from_fork+0x1f/0x30 [ 1860.105713][ T27] [ 1860.109032][ T27] Sending NMI from CPU 0 to CPUs 1: [ 1860.114251][ C1] NMI backtrace for cpu 1 [ 1860.114262][ C1] CPU: 1 PID: 21154 Comm: kworker/u4:8 Not tainted 5.15.151-syzkaller #0 [ 1860.114281][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1860.114291][ C1] Workqueue: bat_events batadv_nc_worker [ 1860.114383][ C1] RIP: 0010:rcu_is_watching+0x56/0xa0 [ 1860.114403][ C1] Code: f0 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 f7 e8 50 02 5f 00 48 c7 c3 c8 b2 03 00 49 03 1e 48 89 d8 48 c1 e8 03 42 0f b6 04 38 <84> c0 75 1a 8b 03 65 ff 0d f5 7f 97 7e 74 08 24 01 5b 41 5e 41 5f [ 1860.114417][ C1] RSP: 0018:ffffc9000e457bd8 EFLAGS: 00000a06 [ 1860.114431][ C1] RAX: 0000000000000000 RBX: ffff8880b9b3b2c8 RCX: ffff888020df0000 [ 1860.114444][ C1] RDX: ffff888020df0000 RSI: ffffffff8ad88f20 RDI: ffffffff8ad88ee0 [ 1860.114457][ C1] RBP: 0000000000000001 R08: ffffffff89f8f765 R09: fffffbfff1f79e19 [ 1860.114469][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 000000000000024f [ 1860.114481][ C1] R13: dffffc0000000000 R14: ffffffff8c34e7f8 R15: dffffc0000000000 [ 1860.114500][ C1] FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 1860.114515][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1860.114527][ C1] CR2: 00007fb8b89b2988 CR3: 0000000036786000 CR4: 00000000003506e0 [ 1860.114542][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1860.114552][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1860.114562][ C1] Call Trace: [ 1860.114567][ C1] [ 1860.114572][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 1860.114594][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1860.114613][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1860.114633][ C1] ? unknown_nmi_error+0xd0/0xd0 [ 1860.114658][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1860.114675][ C1] ? nmi_handle+0xf7/0x370 [ 1860.114693][ C1] ? rcu_is_watching+0x56/0xa0 [ 1860.114708][ C1] ? default_do_nmi+0x62/0x150 [ 1860.114725][ C1] ? exc_nmi+0xab/0x120 [ 1860.114740][ C1] ? end_repeat_nmi+0x16/0x31 [ 1860.114761][ C1] ? batadv_nc_worker+0x1c5/0x5b0 [ 1860.114778][ C1] ? rcu_is_watching+0x56/0xa0 [ 1860.114794][ C1] ? rcu_is_watching+0x56/0xa0 [ 1860.114811][ C1] ? rcu_is_watching+0x56/0xa0 [ 1860.114827][ C1] [ 1860.114832][ C1] [ 1860.114838][ C1] batadv_nc_worker+0x1ce/0x5b0 [ 1860.114857][ C1] process_one_work+0x8a1/0x10c0 [ 1860.114883][ C1] ? worker_detach_from_pool+0x260/0x260 [ 1860.114903][ C1] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1860.114920][ C1] ? kthread_data+0x4e/0xc0 [ 1860.114936][ C1] ? wq_worker_running+0x97/0x170 [ 1860.114954][ C1] worker_thread+0xaca/0x1280 [ 1860.114971][ C1] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1860.115001][ C1] kthread+0x3f6/0x4f0 [ 1860.115016][ C1] ? rcu_lock_release+0x20/0x20 [ 1860.115032][ C1] ? kthread_blkcg+0xd0/0xd0 [ 1860.115049][ C1] ret_from_fork+0x1f/0x30 [ 1860.115073][ C1] [ 1860.242895][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 1860.242911][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0 [ 1860.242931][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1860.242942][ T27] Call Trace: [ 1860.242950][ T27] [ 1860.242957][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1860.242995][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1860.243018][ T27] ? panic+0x84d/0x84d [ 1860.243047][ T27] panic+0x318/0x84d [ 1860.243066][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 1860.243090][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1860.243117][ T27] ? fb_is_primary_device+0xcc/0xcc [ 1860.243137][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1860.243162][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1860.243185][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1860.243211][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1860.243237][ T27] watchdog+0xeb0/0xeb0 [ 1860.243268][ T27] kthread+0x3f6/0x4f0 [ 1860.243287][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1860.243307][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1860.243327][ T27] ret_from_fork+0x1f/0x30 [ 1860.243359][ T27] [ 1860.243637][ T27] Kernel Offset: disabled [ 1860.530268][ T27] Rebooting in 86400 seconds..