0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:50:39 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
12:50:39 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:50:39 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x0, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:50:39 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:50:40 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:50:40 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x0, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
12:50:40 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:50:40 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
syz_clone(0x0, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
12:50:40 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:50:41 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x0, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x0, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:50:41 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x0, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
12:50:41 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:50:41 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x0, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:50:41 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
syz_clone(0x0, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
12:50:42 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x0, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x0, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:50:42 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xa, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:50:42 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x0, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
12:50:42 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
syz_clone(0x0, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
12:50:43 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x0, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x0, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:50:43 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:50:43 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:50:43 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
12:50:43 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
12:50:44 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(0x0, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:50:44 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xa, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:50:44 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xa, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:50:44 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
12:50:44 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:50:45 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:50:45 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
12:50:45 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xa, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:50:45 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
12:50:45 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xa, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:50:45 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:50:46 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
12:50:46 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xa, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:50:46 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
12:50:46 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:50:46 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:50:46 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(0x0, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:50:46 executing program 3:
bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
12:50:46 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:50:48 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:50:48 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:50:48 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:50:49 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:50:49 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:50:50 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
[ 3237.298936][T21700] Bluetooth: hci0: command 0x0406 tx timeout
[ 3239.010075][T13833] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3239.208968][T21700] Bluetooth: hci2: command 0x0409 tx timeout
[ 3239.239464][T13833] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3239.991794][T13833] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3240.671843][T18837] chnl_net:caif_netlink_parms(): no params data found
[ 3241.239737][T13833] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3241.289125][ T3572] Bluetooth: hci2: command 0x041b tx timeout
[ 3242.088880][T22649] Bluetooth: hci4: command 0x0409 tx timeout
[ 3242.409306][ T9422] Bluetooth: hci3: command 0x0406 tx timeout
[ 3242.432339][T18837] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3242.458864][T18837] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3242.488265][T18837] device bridge_slave_0 entered promiscuous mode
[ 3242.523753][T18843] chnl_net:caif_netlink_parms(): no params data found
[ 3242.533233][T18837] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3242.554497][T18837] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3242.566000][T18837] device bridge_slave_1 entered promiscuous mode
[ 3243.369602][T26782] Bluetooth: hci2: command 0x040f tx timeout
[ 3243.844412][T18837] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 3243.899945][T18837] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 3244.171807][ T3572] Bluetooth: hci4: command 0x041b tx timeout
[ 3244.520190][T18837] team0: Port device team_slave_0 added
[ 3244.599859][T18843] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3244.606936][T18843] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3244.649845][T18843] device bridge_slave_0 entered promiscuous mode
[ 3244.697490][T18837] team0: Port device team_slave_1 added
[ 3245.449657][ T3572] Bluetooth: hci2: command 0x0419 tx timeout
[ 3245.971495][T18843] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3245.978577][T18843] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3246.030448][T18843] device bridge_slave_1 entered promiscuous mode
[ 3246.229175][T18837] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 3246.237126][T18837] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3246.265544][T26782] Bluetooth: hci4: command 0x040f tx timeout
[ 3246.316879][T18837] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 3246.850286][T18837] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 3246.857255][T18837] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3246.916126][T18837] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 3246.937848][T18843] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 3247.011179][T18843] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 3247.082658][T18837] device hsr_slave_0 entered promiscuous mode
[ 3247.115435][T18837] device hsr_slave_1 entered promiscuous mode
[ 3247.138642][T18837] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 3247.168964][T18837] Cannot create hsr debugfs directory
[ 3247.199957][T18843] team0: Port device team_slave_0 added
[ 3247.232518][T18843] team0: Port device team_slave_1 added
[ 3247.505471][T18843] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 3247.526846][T18843] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3247.588811][T18843] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 3247.754495][T18843] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 3247.772082][T18843] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3247.808793][T18843] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 3247.922647][T18843] device hsr_slave_0 entered promiscuous mode
[ 3247.930113][T18843] device hsr_slave_1 entered promiscuous mode
[ 3247.936682][T18843] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 3247.948812][T18843] Cannot create hsr debugfs directory
[ 3248.329017][ T9422] Bluetooth: hci4: command 0x0419 tx timeout
[ 3248.591153][T13833] device hsr_slave_0 left promiscuous mode
[ 3248.649059][T13833] device hsr_slave_1 left promiscuous mode
[ 3248.660086][T13833] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 3248.667488][T13833] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 3248.699207][T13833] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 3248.709099][T13833] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 3248.796653][T13833] device bridge_slave_1 left promiscuous mode
[ 3248.809949][T13833] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3248.860247][T13833] device bridge_slave_0 left promiscuous mode
[ 3248.866501][T13833] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3249.159011][T13833] device veth1_macvtap left promiscuous mode
[ 3249.165060][T13833] device veth0_macvtap left promiscuous mode
[ 3249.178910][T13833] device veth1_vlan left promiscuous mode
[ 3249.184710][T13833] device veth0_vlan left promiscuous mode
[ 3249.826025][T13833] team0 (unregistering): Port device team_slave_1 removed
[ 3249.850022][T13833] team0 (unregistering): Port device team_slave_0 removed
[ 3249.942006][T13833] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 3249.983714][T13833] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 3250.114850][T13833] bond0 (unregistering): Released all slaves
[ 3250.236529][T18843] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3250.339097][T18843] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3250.462375][T18843] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3250.561257][T18843] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3250.635615][T18888] chnl_net:caif_netlink_parms(): no params data found
[ 3250.729185][ T9422] Bluetooth: hci3: command 0x0409 tx timeout
[ 3250.782986][T18837] netdevsim netdevsim3 netdevsim0: renamed from eth0
[ 3250.839639][T18837] netdevsim netdevsim3 netdevsim1: renamed from eth1
[ 3250.860951][T18837] netdevsim netdevsim3 netdevsim2: renamed from eth2
[ 3250.887807][T18888] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3250.899000][T18888] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3250.907038][T18888] device bridge_slave_0 entered promiscuous mode
[ 3250.928838][T18888] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3250.935891][T18888] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3250.944577][T18888] device bridge_slave_1 entered promiscuous mode
[ 3250.952026][T18837] netdevsim netdevsim3 netdevsim3: renamed from eth3
[ 3250.995090][T18888] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 3251.021174][T18888] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 3251.082941][T18843] netdevsim netdevsim1 netdevsim0: renamed from eth0
[ 3251.103304][T18888] team0: Port device team_slave_0 added
[ 3251.119726][T18843] netdevsim netdevsim1 netdevsim1: renamed from eth1
[ 3251.130577][T18843] netdevsim netdevsim1 netdevsim2: renamed from eth2
[ 3251.152830][T18888] team0: Port device team_slave_1 added
[ 3251.159939][T18843] netdevsim netdevsim1 netdevsim3: renamed from eth3
[ 3251.224582][T18888] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 3251.239377][T18888] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3251.273012][T18888] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 3251.313996][T18888] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 3251.322501][T18888] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3251.350019][T18888] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 3251.432002][T18837] 8021q: adding VLAN 0 to HW filter on device bond0
[ 3251.451329][T18888] device hsr_slave_0 entered promiscuous mode
[ 3251.459662][T18888] device hsr_slave_1 entered promiscuous mode
[ 3251.473706][T18888] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 3251.483644][T18888] Cannot create hsr debugfs directory
[ 3251.496335][T18843] 8021q: adding VLAN 0 to HW filter on device bond0
[ 3251.534924][ T4201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 3251.548126][ T4201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 3251.561709][T18837] 8021q: adding VLAN 0 to HW filter on device team0
[ 3251.630843][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 3251.639696][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 3251.647466][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 3251.661839][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 3251.670693][T28109] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3251.677747][T28109] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 3251.685686][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 3251.694544][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 3251.703339][T28109] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3251.710426][T28109] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 3251.723641][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 3251.750926][T18843] 8021q: adding VLAN 0 to HW filter on device team0
[ 3251.790246][ T4201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 3251.840066][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 3251.848686][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 3251.868363][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 3251.877547][ T3570] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3251.884632][ T3570] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 3251.892719][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 3251.901575][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 3251.910317][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 3251.920252][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 3251.928614][ T3570] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3251.935690][ T3570] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 3251.953787][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 3251.966899][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 3251.980534][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 3252.036868][T18888] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3252.052031][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 3252.068131][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 3252.078059][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 3252.095739][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 3252.108659][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 3252.122724][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 3252.137171][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 3252.150243][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 3252.158560][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 3252.175623][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 3252.184364][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 3252.193027][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 3252.201654][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 3252.210097][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 3252.218421][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 3252.227860][T18837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 3252.243226][T18843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 3252.260553][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 3252.280507][T18888] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3252.383946][T18888] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3252.446232][T18888] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3252.478913][ T4216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 3252.486360][ T4216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 3252.516969][T18843] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 3252.525955][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 3252.534095][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 3252.543941][T18837] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 3252.569145][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 3252.578256][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 3252.602796][ T9422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 3252.611520][ T9422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 3252.633871][T18843] device veth0_vlan entered promiscuous mode
[ 3252.642913][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 3252.651497][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 3252.662876][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 3252.673825][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 3252.693067][T18837] device veth0_vlan entered promiscuous mode
[ 3252.706525][T18843] device veth1_vlan entered promiscuous mode
[ 3252.717687][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 3252.726208][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 3252.734666][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 3252.747405][T18837] device veth1_vlan entered promiscuous mode
[ 3252.769251][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 3252.777081][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 3252.785007][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 3252.792958][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 3252.809046][T26782] Bluetooth: hci3: command 0x041b tx timeout
[ 3252.817295][T18888] netdevsim netdevsim2 netdevsim0: renamed from eth0
[ 3252.853266][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 3252.863487][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 3252.872133][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 3252.880807][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 3252.889353][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 3252.898663][T18888] netdevsim netdevsim2 netdevsim1: renamed from eth1
[ 3252.911644][T18888] netdevsim netdevsim2 netdevsim2: renamed from eth2
[ 3252.921162][T18843] device veth0_macvtap entered promiscuous mode
[ 3252.930441][T18837] device veth0_macvtap entered promiscuous mode
[ 3252.937185][T18888] netdevsim netdevsim2 netdevsim3: renamed from eth3
[ 3252.957214][T18843] device veth1_macvtap entered promiscuous mode
[ 3252.967788][T18837] device veth1_macvtap entered promiscuous mode
[ 3253.005946][T18837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3253.017311][T18837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.027359][T18837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3253.038564][T18837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.048912][T18837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3253.059515][T18837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.069556][T18837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3253.085070][T18837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.095064][T18837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3253.105904][T18837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.116999][T18837] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 3253.132030][T18843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3253.142828][T18843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.152967][T18843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3253.163761][T18843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.173843][T18843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3253.185515][T18843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.195643][T18843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3253.207520][T18843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.217467][T18843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3253.227943][T18843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.237853][T18843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3253.248351][T18843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.259754][T18843] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 3253.276618][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 3253.285138][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 3253.296733][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 3253.305191][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 3253.313250][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 3253.322232][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 3253.331091][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 3253.339888][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 3253.362083][T18837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3253.374139][T18837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.384318][T18837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3253.394966][T18837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.404986][T18837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3253.415835][T18837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.425863][T18837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3253.436428][T18837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.446397][T18837] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3253.457312][T18837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.468460][T18837] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 3253.502274][ T4201] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 3253.511364][ T4201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 3253.521571][T18843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3253.532729][T18843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.543066][T18843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3253.553670][T18843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.563744][T18843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3253.574292][T18843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.584305][T18843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3253.594886][T18843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.604841][T18843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3253.616493][T18843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.628644][T18843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3253.643712][T18843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3253.654605][T18843] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 3253.667871][T18837] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 3253.676912][T18837] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 3253.686672][T18837] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 3253.695638][T18837] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 3253.714803][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 3253.723392][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 3253.738174][T18843] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 3253.747033][T18843] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 3253.755900][T18843] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 3253.764868][T18843] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 3253.797578][T18888] 8021q: adding VLAN 0 to HW filter on device bond0
[ 3253.876323][T18888] 8021q: adding VLAN 0 to HW filter on device team0
[ 3253.884621][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 3253.892638][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 3253.938122][ T144] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 3253.946968][ T144] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 3253.967640][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 3253.976220][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 3253.984890][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 3253.993693][T28109] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3254.000755][T28109] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 3254.008539][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 3254.017329][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 3254.025894][T28109] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3254.032963][T28109] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 3254.040684][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 3254.049315][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 3254.057726][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 3254.066429][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 3254.075647][ T4201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 3254.083633][ T4201] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 3254.118326][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 3254.128003][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 3254.159526][T13770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 3254.167676][T13770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 3254.177179][T23973] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 3254.194185][T23973] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 3254.202151][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 3254.214700][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 3254.236019][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 3254.246317][T18888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 3254.250718][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 3254.255196][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 3254.283583][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 3254.310146][ T1183] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 3254.343481][ T1183] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 3254.362396][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 3254.546278][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 3254.556602][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 3254.592128][T18888] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 3254.640412][T13770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 3254.653597][T13770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 3254.697823][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 3254.706485][T18943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 3254.718644][T13833] device hsr_slave_0 left promiscuous mode
[ 3254.725710][T13833] device hsr_slave_1 left promiscuous mode
[ 3254.733332][T13833] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 3254.742102][T13833] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 3254.751594][T13833] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 3254.759319][T13833] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 3254.768300][T13833] device bridge_slave_1 left promiscuous mode
[ 3254.781600][T13833] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3254.790515][T13833] device bridge_slave_0 left promiscuous mode
[ 3254.796692][T13833] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3254.820405][T13833] device hsr_slave_0 left promiscuous mode
[ 3254.826703][T13833] device hsr_slave_1 left promiscuous mode
[ 3254.843737][T13833] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 3254.855514][T13833] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 3254.873006][T13833] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 3254.884743][T13833] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 3254.892289][ T3572] Bluetooth: hci3: command 0x040f tx timeout
[ 3254.921210][T13833] device bridge_slave_1 left promiscuous mode
[ 3254.927375][T13833] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3254.935847][T13833] device bridge_slave_0 left promiscuous mode
[ 3254.944544][T13833] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3254.983336][T13833] device veth1_macvtap left promiscuous mode
[ 3254.995162][T13833] device veth0_macvtap left promiscuous mode
[ 3255.006213][T13833] device veth1_vlan left promiscuous mode
[ 3255.016248][T13833] device veth0_vlan left promiscuous mode
[ 3255.027691][T13833] device veth1_macvtap left promiscuous mode
[ 3255.038158][T13833] device veth0_macvtap left promiscuous mode
[ 3255.050942][T13833] device veth1_vlan left promiscuous mode
[ 3255.056721][T13833] device veth0_vlan left promiscuous mode
[ 3255.475027][T13833] team0 (unregistering): Port device team_slave_1 removed
[ 3255.518855][T13833] team0 (unregistering): Port device team_slave_0 removed
[ 3255.564806][T13833] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 3255.596308][T13833] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 3255.730397][T13833] bond0 (unregistering): Released all slaves
[ 3255.854290][T13833] team0 (unregistering): Port device team_slave_1 removed
[ 3255.866249][T13833] team0 (unregistering): Port device team_slave_0 removed
[ 3255.883731][T13833] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 3255.897729][T13833] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 3255.953856][T13833] bond0 (unregistering): Released all slaves
[ 3256.016403][T18888] device veth0_vlan entered promiscuous mode
[ 3256.026358][T13770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 3256.034255][T13770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 3256.048379][T18888] device veth1_vlan entered promiscuous mode
[ 3256.104238][T18888] device veth0_macvtap entered promiscuous mode
[ 3256.112152][T13770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 3256.121056][T13770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 3256.136838][T13770] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 3256.147882][T18888] device veth1_macvtap entered promiscuous mode
[ 3256.162770][T18888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3256.173694][T18888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3256.187110][T18888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3256.197714][T18888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3256.207674][T18888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3256.218322][T18888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3256.228260][T18888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3256.238944][T18888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3256.248738][T18888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3256.259552][T18888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3256.272807][T18888] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 3256.280556][T13770] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 3256.288259][T13770] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 3256.296838][T13770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 3256.307963][T18888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3256.318694][T18888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3256.328706][T18888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3256.339371][T18888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3256.349545][T18888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3256.360017][T18888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3256.370452][T18888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3256.381821][T18888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3256.391988][T18888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3256.402431][T18888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3256.413514][T18888] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 3256.421791][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 3256.430405][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 3256.441056][T18888] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 3256.449853][T18888] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 3256.458534][T18888] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 3256.469012][T18888] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 3256.537767][T23973] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 3256.556380][T23973] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 3256.566856][T28109] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 3256.580063][ T144] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 3256.587985][ T144] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 3256.597423][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
12:51:15 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
syz_clone(0x4000000, &(0x7f0000000500), 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
12:51:15 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:15 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:15 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:15 executing program 3:
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
12:51:15 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:15 executing program 3:
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:51:15 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:15 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:15 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:15 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:15 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:51:15 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
12:51:15 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
[ 3256.969273][ T3572] Bluetooth: hci3: command 0x0419 tx timeout
12:51:15 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:51:15 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:15 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:15 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:15 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, 0x0, &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
12:51:15 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xa, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:15 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:15 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:16 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:16 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:16 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0)
12:51:16 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:16 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:16 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:16 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:16 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x0, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:51:16 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xa, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:16 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:16 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:16 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:16 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:17 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:17 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:17 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:17 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:17 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:17 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:17 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:17 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x0, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:17 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:17 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:17 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:18 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:18 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300), 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:18 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x0, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:18 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x0, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:18 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:18 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:18 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300), 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:19 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x0, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:19 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:19 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:19 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:51:19 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:19 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:19 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x6, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:51:19 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:20 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:20 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x0, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:20 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:20 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x0, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:20 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:20 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x0, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:21 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:21 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:21 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x0, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:21 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:21 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:21 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:21 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x0, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:22 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x3f, 0x0, 0x0, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:22 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:22 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:22 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:22 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x0, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:22 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x0, 0x8, 0x46, 0x0, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:22 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:22 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:22 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:23 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:23 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:23 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:23 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:24 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:24 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x0, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:24 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
[ 3265.942502][ T1379] ieee802154 phy0 wpan0: encryption failed: -22
[ 3265.948820][ T1379] ieee802154 phy1 wpan1: encryption failed: -22
12:51:24 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:24 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:25 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:25 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:25 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c")
write$cgroup_pid(r1, &(0x7f0000000640), 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:25 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x0, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:25 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:25 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:26 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c")
write$cgroup_pid(r1, &(0x7f0000000640), 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:26 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:26 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:26 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x0, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:26 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00'}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:27 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:27 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x0, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:27 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00'}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:27 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:27 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00'}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:28 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:28 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:28 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:28 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:51:29 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:29 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00'}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:29 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
12:51:29 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:30 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:30 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:30 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, 0x0, 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:30 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00'}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:30 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:51:31 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:31 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:31 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x0, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:31 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x0, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:31 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00'}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:51:32 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:51:32 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:32 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:32 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:32 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00'}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
12:51:33 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:51:33 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:33 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:33 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:51:33 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00'}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
12:51:34 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:34 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:34 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:51:34 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:35 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:51:35 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:51:36 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:51:36 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:51:36 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:51:36 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x0, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
[ 3277.884657][ T144] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
12:51:37 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r1}, 0x10)
r2 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0)
syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
[ 3279.613494][ T144] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3283.010723][ T144] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3284.239435][ T144] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 3287.224363][ T144] device hsr_slave_0 left promiscuous mode
[ 3287.245274][ T144] device hsr_slave_1 left promiscuous mode
[ 3287.263545][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 3287.272832][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 3287.305335][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 3287.340645][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 3287.356467][ T144] device bridge_slave_1 left promiscuous mode
[ 3287.372194][ T144] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3287.394560][ T144] device bridge_slave_0 left promiscuous mode
[ 3287.405641][ T144] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3287.453472][ T144] device veth1_macvtap left promiscuous mode
[ 3287.460017][ T144] device veth0_macvtap left promiscuous mode
[ 3287.486313][ T144] device veth1_vlan left promiscuous mode
[ 3287.503497][ T144] device veth0_vlan left promiscuous mode
[ 3288.245988][ T144] team0 (unregistering): Port device team_slave_1 removed
[ 3288.331263][ T144] team0 (unregistering): Port device team_slave_0 removed
[ 3288.370151][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 3288.403948][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 3288.744859][ T144] bond0 (unregistering): Released all slaves
[ 3308.167869][T19710] chnl_net:caif_netlink_parms(): no params data found
[ 3308.526969][T19710] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3308.534317][T19710] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3308.543014][T19710] device bridge_slave_0 entered promiscuous mode
[ 3308.552008][T19710] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3308.559523][T19710] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3308.567446][T19710] device bridge_slave_1 entered promiscuous mode
[ 3308.599967][T19710] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 3308.611173][T19710] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 3308.646455][T19710] team0: Port device team_slave_0 added
[ 3308.654722][T19710] team0: Port device team_slave_1 added
[ 3308.686107][T19710] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 3308.693420][T19710] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3308.777763][T19710] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 3308.819226][T19710] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 3308.826333][T19710] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 3308.914314][T19710] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 3309.609017][T21700] Bluetooth: hci4: command 0x0409 tx timeout
[ 3310.111995][T19710] device hsr_slave_0 entered promiscuous mode
[ 3310.305564][T19710] device hsr_slave_1 entered promiscuous mode
[ 3310.367974][T19710] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 3310.396957][T19710] Cannot create hsr debugfs directory
[ 3311.688864][T28109] Bluetooth: hci4: command 0x041b tx timeout
[ 3312.539160][T19710] netdevsim netdevsim1 netdevsim0: renamed from eth0
[ 3312.731242][T19710] netdevsim netdevsim1 netdevsim1: renamed from eth1
[ 3312.848687][T19710] netdevsim netdevsim1 netdevsim2: renamed from eth2
[ 3313.012121][T19710] netdevsim netdevsim1 netdevsim3: renamed from eth3
[ 3313.342738][T19710] 8021q: adding VLAN 0 to HW filter on device bond0
[ 3313.396800][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 3313.410226][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 3313.423619][T19710] 8021q: adding VLAN 0 to HW filter on device team0
[ 3313.462029][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 3313.481536][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 3313.504791][T22649] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3313.511906][T22649] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 3313.573028][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 3313.595595][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 3313.661908][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 3313.714354][ T3572] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3313.721474][ T3572] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 3313.741766][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 3313.778849][ T3570] Bluetooth: hci4: command 0x040f tx timeout
[ 3313.793859][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 3313.882497][ T9422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 3313.898042][ T9422] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 3313.942892][ T9422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 3313.989599][ T9422] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 3313.998137][ T9422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 3314.040595][ T9422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 3314.071649][ T9422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 3314.106253][ T9422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 3314.121047][T19710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 3314.136191][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 3314.405535][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 3314.429203][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 3314.460294][T19710] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 3314.516035][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 3314.527351][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 3314.582481][T19710] device veth0_vlan entered promiscuous mode
[ 3314.596795][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 3314.608522][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 3314.627904][T19710] device veth1_vlan entered promiscuous mode
[ 3314.645719][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 3314.677133][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 3314.709376][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 3314.744661][T19710] device veth0_macvtap entered promiscuous mode
[ 3314.822157][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 3314.845573][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 3314.887754][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 3314.902832][T19710] device veth1_macvtap entered promiscuous mode
[ 3314.942955][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 3314.955575][T26782] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 3314.977794][T19710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3314.994423][T19710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3315.020123][T19710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3315.030881][T19710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3315.043608][T19710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3315.056047][T19710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3315.066519][T19710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3315.110092][T19710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3315.121581][T19710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[ 3315.140609][T19710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3315.204785][T19710] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 3315.256764][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 3315.279486][ T3572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 3315.293194][T19710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3315.343481][T19710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3315.370955][T19710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3315.382374][T19710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3315.403370][T19710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3315.414013][T19710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3315.430395][T19710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3315.485575][T19710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3315.497673][T19710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[ 3315.508412][T19710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[ 3315.536539][T19710] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 3315.593320][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 3315.603679][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 3315.674064][T19710] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 3315.718878][T19710] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 3315.727586][T19710] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 3315.777353][T19710] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 3315.859077][ T9155] Bluetooth: hci4: command 0x0419 tx timeout
[ 3316.350028][ T1170] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 3316.358028][ T1170] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 3316.424872][T13833] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 3316.431242][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 3316.440601][T13833] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 3316.459258][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
12:52:15 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00'}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
12:52:15 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8ce")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:15 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8ce")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:15 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:15 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:15 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r1}, 0x10)
r2 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:52:15 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00'}, 0x10)
12:52:15 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r1}, 0x10)
openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:52:15 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:15 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
12:52:15 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:15 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:15 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r1}, 0x10)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:52:15 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8ce")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:15 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:15 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
12:52:16 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:52:16 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:16 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r1}, 0x10)
r2 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0)
syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
12:52:16 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:52:16 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
12:52:16 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r1}, 0x10)
r2 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0)
12:52:16 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:16 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:52:16 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r1}, 0x10)
openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
12:52:16 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:16 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r1}, 0x10)
12:52:16 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
12:52:16 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:52:16 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:16 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
12:52:16 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:17 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
12:52:17 executing program 5:
bpf$ITER_CREATE(0x21, 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:52:17 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
12:52:17 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
12:52:17 executing program 5:
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0)
12:52:17 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:17 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0)
r3 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r3, 0x12)
openat$cgroup_ro(r2, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:17 executing program 1:
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
12:52:17 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a20")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:17 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:17 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:17 executing program 1:
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
12:52:17 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:17 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:18 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x0, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:18 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x0, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:52:18 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:18 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x0, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:18 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0)
r3 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r3, 0x12)
openat$cgroup_ro(r2, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:18 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:18 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x0)
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:18 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:18 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:18 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:18 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:19 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x0, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:19 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0)
r3 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r3, 0x12)
openat$cgroup_ro(r2, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:19 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:52:19 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:19 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:19 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xa, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:19 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, 0x0, 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:20 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:20 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x7, &(0x7f00000001c0)=@raw=[@alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:20 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0, r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:20 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xa, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:20 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:20 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:20 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a20")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:20 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:52:21 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:52:21 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0, r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:21 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:21 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:52:21 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:21 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x0, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:21 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x0, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:22 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:52:22 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:22 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x0, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:22 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:22 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0, r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:22 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:22 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:23 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:23 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:23 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:23 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0)
r3 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r3, 0x12)
openat$cgroup_ro(r2, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:23 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:23 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:24 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:24 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:24 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:24 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:25 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:25 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0)
r3 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r3, 0x12)
openat$cgroup_ro(r2, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:25 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0)
r3 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r3, 0x12)
openat$cgroup_ro(r2, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:25 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:25 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
[ 3327.371034][ T1379] ieee802154 phy0 wpan0: encryption failed: -22
[ 3327.377339][ T1379] ieee802154 phy1 wpan1: encryption failed: -22
12:52:26 executing program 1:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
r2 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0)
r3 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r3, 0x12)
r4 = openat$cgroup_ro(r2, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r4, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r3, 0x0, r4, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:26 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:26 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0)
r3 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r3, 0x12)
openat$cgroup_ro(r2, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:27 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0)
r3 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r3, 0x12)
openat$cgroup_ro(r2, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:27 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:27 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:27 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:27 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:27 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:28 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:28 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:28 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), 0x0)
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:28 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, 0x0, &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:28 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, 0x0, &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:29 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:29 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:29 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:29 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:29 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:30 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:52:30 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:30 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:30 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:31 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:31 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:31 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:31 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:31 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x0, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:32 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:32 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:32 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:32 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:33 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x0, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:33 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:33 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:33 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:33 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:34 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:34 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x0, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:34 executing program 3:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x0, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:35 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x0, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:35 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:35 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:35 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r2 = syz_clone(0x0, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:36 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:36 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0x0, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:36 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:37 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:37 executing program 5:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:37 executing program 3:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:37 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:37 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0x0, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:37 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
r6 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r6, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r7, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:38 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:38 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0x0, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
12:52:38 executing program 2:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb}, @func], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000ec0))
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001380)={r5, &(0x7f00000011c0)="7f2abf7208a6979ba08376600df8fb2fd753198025cbc1007ed44e3c60b69ac15690590dc53b69b3fdabbbcc421847c1122b3a64a2602e9f92ac17a9da73b785a01613be43e6acc2a11c374a69efbe105444cd2cfbbd39dd1f439941b94d8252e10dac3234ffca3c89178f299fef7118a36e9e7c2a491a5e3ad31cee7cd6a4bafe3b038734df104790aa87d5ba8ee624694e5e145db06388c6695eeb14ffe04ae9ae6070b7e197ed1e", &(0x7f0000001280)=""/243}, 0x20)
12:52:38 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00'}, 0x10)
openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0)
r2 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r2, 0x12)
r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000840)='memory.events.local\x00', 0x0, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={r4, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r2, 0x0, r3, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="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", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:39 executing program 5:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0xa, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x1}, @alu={0x7, 0x0, 0x1, 0x6, 0x5, 0xffffffffffffffe0}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}], &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
12:52:39 executing program 2:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r5, &(0x7f00000006c0), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001180)={&(0x7f0000000f80)="39f1441fe3d63d2a8fc8bbcdf666f922379944cfc31138c3569333add053c0140b1d857d344fb954", &(0x7f0000000fc0)=""/49, &(0x7f0000001000)="e62a6bcbbde401c52d43027c029c6952b2c450749beab836a6da368180912387bae7292e438b5ec1f8b9da76cad9dc4ecbeb6d56f9adc7c4578f30340e0cc9518412061d3aa983d739a7ab824e456f0f1bb26db7b7211d40a5ca357cfb661602f3391b917f57d25f0f7cc2a13c1d9d86b74b0cf7fd570a0ab186c3dd4b00672cbed341a1b0ff5e7168c5feec6c2fa649af2134200dc851d5e140c523864ef690aa567d0bc78186b3af30a6fbb21e9926ed29af6232a0c0c3b3bd40bc42174f28043cf5fba9c43d194ff8ceed5d8fd331ad5c25affbfa1887438384f97d5c13d2fc4b1c64a7adb255fae6a40ba30942a6c1c4769264fc04066168b28fdd", &(0x7f0000001100)="831b65ec1bdd9ca27a3d031e8065065e374b045979f854dcfaa361a33594577b810df7e4a45da1e5b8c7eebadf5394c4eccf098f514b78a0323235b11bc13ecb3ecc29e33c6827423ee6a64445a63ab15f8c9153cc2a6dcb615443f4435dd3e2d772dfcddad1ed0cac1c4407564d2b8074f1fb598caee471ac3f5bb5dcf5ae", 0x200, 0xffffffffffffffff, 0x4}, 0x38)
12:52:39 executing program 4:
r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x8, &(0x7f00000001c0)=@raw=[@map_idx_val, @func, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
12:52:40 executing program 1:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_freezer_state(r0, &(0x7f0000000040)='THAWED\x00', 0x7)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x8, r0}, 0x18)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8)
write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x1, 0x78, &(0x7f0000000280)=""/120, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x7ff, 0x9, 0xe2d, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='host1x_channel_submit_complete\x00', r2}, 0x10)
r3 = openat$cgroup_ro(r0, &(0x7f0000000480)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
openat$cgroup_freezer_state(r3, &(0x7f00000004c0), 0x2, 0x0)
r4 = syz_clone(0x4000000, &(0x7f0000000500)="95a47e85f596805beaf71515305d1d6560cade470719a39b00c3eb37d8e287a4b63dbef9ba8899f69e68d41dabe9c655b04ad0c74d11f6488256e4a9289a8a93195208f9996eb2", 0x47, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="72f595a76c37d2f12c123e92f66a324be81d9734389ca9bf2493ec7a891498e45ab2d82281fae1001ca7b0117bf7c2f8cee783c3b24a208c0ebbcf8d8046")
write$cgroup_pid(r1, &(0x7f0000000640)=r4, 0x12)
r5 = openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='xen_mmu_flush_tlb_one_user\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x6, 0x2, 0x1, 0x1f, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext, 0x100, 0x7, 0x0, 0x7, 0x4, 0x1ff, 0xff, 0x0, 0x2, 0x0, 0x80000000}, r1, 0xc, 0xffffffffffffffff, 0x0)
openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000800)='cpu.pressure\x00', 0x2, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000a40)={0xffffffffffffffff, &(0x7f0000000880)="79dffd4882ef2b86a2d019b7b4549f6a57de18fe42ba97c8650161051963a6f3905854f685632f2152d80055c2160995118bb31486fd0da7a7499792f681d1842269a0094c80e559b8d62c5c5b251a1c47064ee03fd933a81a229d65b8425dc33e9753d569fb78626653a8432551871d6e8b951ddaebc90a06bf4934f47db730814c63926b1a8e46ebe7a2963a48f51e2b22ece1da195e45f49571f7d8e433e110f1cc6da22c0b2dfcc63ea69a88b2d5040aa73d6c37fdc7f5b2735f837eb09156aa1db488", &(0x7f0000000980)=""/182, 0x4}, 0x20)
perf_event_open(&(0x7f0000000a80)={0x2, 0x80, 0x1, 0x8, 0x46, 0x3f, 0x0, 0x6, 0x40000, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0xffffffffffff0001, 0x1000}, 0x2984, 0xffffffffffffffff, 0x8, 0x9, 0x6, 0x6, 0x1, 0x0, 0x7, 0x0, 0x947e}, r4, 0x0, r5, 0x0)
r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00), 0x4)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r6, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10)
[ 3360.168822][ T3570] Bluetooth: hci2: command 0x0406 tx timeout
[ 3375.528938][ T3570] Bluetooth: hci3: command 0x0406 tx timeout
[ 3388.811923][ T1379] ieee802154 phy0 wpan0: encryption failed: -22
[ 3388.818230][ T1379] ieee802154 phy1 wpan1: encryption failed: -22
[ 3431.848853][ T9421] Bluetooth: hci4: command 0x0406 tx timeout
[ 3450.260760][ T1379] ieee802154 phy0 wpan0: encryption failed: -22
[ 3450.267067][ T1379] ieee802154 phy1 wpan1: encryption failed: -22
[ 3482.898889][ T27] INFO: task syz-executor.3:18837 blocked for more than 143 seconds.
[ 3482.907225][ T27] Not tainted 5.15.132-syzkaller #0
[ 3482.913946][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 3482.922958][ T27] task:syz-executor.3 state:D stack:20824 pid:18837 ppid: 1 flags:0x00004006
[ 3482.933534][ T27] Call Trace:
[ 3482.936830][ T27]
[ 3482.940571][ T27] __schedule+0x12c4/0x4590
[ 3482.945375][ T27] ? __sched_text_start+0x8/0x8
[ 3482.952034][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 3482.958090][ T27] ? print_irqtrace_events+0x210/0x210
[ 3482.963795][ T27] ? _raw_spin_lock_irq+0xdb/0x110
[ 3482.969161][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3482.974379][ T27] schedule+0x11b/0x1f0
[ 3482.978547][ T27] rwsem_down_write_slowpath+0xebb/0x15c0
[ 3482.985710][ T27] ? clear_nonspinnable+0x60/0x60
[ 3482.990993][ T27] ? read_lock_is_recursive+0x10/0x10
[ 3482.996388][ T27] ? end_current_label_crit_section+0x147/0x170
[ 3483.003062][ T27] down_write+0x164/0x170
[ 3483.007403][ T27] ? down_read_killable+0x350/0x350
[ 3483.012976][ T27] ? may_delete+0x560/0x700
[ 3483.017550][ T27] vfs_unlink+0xe0/0x5f0
[ 3483.022198][ T27] do_unlinkat+0x49d/0x940
[ 3483.026632][ T27] ? fsnotify_link_count+0xf0/0xf0
[ 3483.032073][ T27] ? strncpy_from_user+0x209/0x370
[ 3483.037270][ T27] __x64_sys_unlink+0x45/0x50
[ 3483.042305][ T27] do_syscall_64+0x3d/0xb0
[ 3483.046802][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3483.053132][ T27] RIP: 0033:0x7f2f179e8297
[ 3483.057555][ T27] RSP: 002b:00007ffd6bf54138 EFLAGS: 00000206 ORIG_RAX: 0000000000000057
[ 3483.066796][ T27] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f179e8297
[ 3483.074997][ T27] RDX: 00007ffd6bf54160 RSI: 00007ffd6bf541f0 RDI: 00007ffd6bf541f0
[ 3483.083242][ T27] RBP: 00007ffd6bf541f0 R08: 0000000000000000 R09: 0000000000000000
[ 3483.092357][ T27] R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffd6bf552b0
[ 3483.100625][ T27] R13: 00007f2f17a333b9 R14: 000000000032edf7 R15: 0000000000000015
[ 3483.108875][ T27]
[ 3483.112266][ T27] INFO: task syz-executor.5:20003 blocked for more than 143 seconds.
[ 3483.120795][ T27] Not tainted 5.15.132-syzkaller #0
[ 3483.126506][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 3483.135408][ T27] task:syz-executor.5 state:D stack:21216 pid:20003 ppid: 11694 flags:0x00004002
[ 3483.144843][ T27] Call Trace:
[ 3483.148122][ T27]
[ 3483.151395][ T27] __schedule+0x12c4/0x4590
[ 3483.155912][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 3483.162316][ T27] ? print_irqtrace_events+0x210/0x210
[ 3483.167786][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3483.173801][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130
[ 3483.180041][ T27] ? __sched_text_start+0x8/0x8
[ 3483.184906][ T27] ? __might_sleep+0xc0/0xc0
[ 3483.190522][ T27] ? prepare_to_wait_event+0x3aa/0x3e0
[ 3483.195996][ T27] schedule+0x11b/0x1f0
[ 3483.200454][ T27] wb_wait_for_completion+0x164/0x290
[ 3483.205901][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20
[ 3483.216344][ T27] ? init_wait_entry+0xd0/0xd0
[ 3483.225808][ T27] __writeback_inodes_sb_nr+0x2ce/0x370
[ 3483.231617][ T27] ? writeback_inodes_sb_nr+0x30/0x30
[ 3483.236993][ T27] ? down_read_trylock+0x24a/0x3b0
[ 3483.242459][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0
[ 3483.248193][ T27] ? cpumask_next+0xc3/0xf0
[ 3483.252927][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0
[ 3483.258217][ T27] try_to_writeback_inodes_sb+0x94/0xb0
[ 3483.264077][ T27] ext4_da_write_begin+0x228/0xb60
[ 3483.269499][ T27] ? jbd2_journal_start_reserved+0x300/0x300
[ 3483.275543][ T27] ? ext4_set_page_dirty+0x340/0x340
[ 3483.282282][ T27] ? rcu_is_watching+0x11/0xa0
[ 3483.287091][ T27] ? __mark_inode_dirty+0x3dd/0xd60
[ 3483.293107][ T27] generic_perform_write+0x2bf/0x5b0
[ 3483.298462][ T27] ? __mnt_drop_write_file+0xbe/0xf0
[ 3483.304156][ T27] ? grab_cache_page_write_begin+0x90/0x90
[ 3483.310206][ T27] ? ext4_write_checks+0x255/0x2c0
[ 3483.315354][ T27] ext4_buffered_write_iter+0x227/0x360
[ 3483.325431][ T27] ext4_file_write_iter+0x87c/0x1990
[ 3483.330989][ T27] ? _raw_spin_unlock+0x24/0x40
[ 3483.335852][ T27] ? follow_page_pte+0xad5/0xb60
[ 3483.345406][ T27] ? follow_page_mask+0xb59/0x13f0
[ 3483.350763][ T27] ? ext4_file_read_iter+0x6c0/0x6c0
[ 3483.356524][ T27] ? follow_page+0x130/0x130
[ 3483.361634][ T27] ? find_vma+0xd3/0x230
[ 3483.365939][ T27] ? check_vma_flags+0x407/0x490
[ 3483.371388][ T27] ? iov_iter_kvec+0x4a/0x170
[ 3483.376116][ T27] __kernel_write+0x5b1/0xa60
[ 3483.381239][ T27] ? vfs_read+0xe10/0xe10
[ 3483.385629][ T27] ? __lock_acquire+0x1ff0/0x1ff0
[ 3483.390878][ T27] ? down_read_killable+0x1d2/0x350
[ 3483.396610][ T27] __dump_emit+0x264/0x3a0
[ 3483.402790][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0
[ 3483.410818][ T27] ? dump_emit+0x152/0x3f0
[ 3483.415779][ T27] dump_user_range+0x91/0x320
[ 3483.424315][ T27] elf_core_dump+0x3c7d/0x4570
[ 3483.432591][ T27] ? reacquire_held_locks+0x660/0x660
[ 3483.438345][ T27] ? load_elf_library+0xa40/0xa40
[ 3483.447231][ T27] ? mark_lock+0x98/0x340
[ 3483.452460][ T27] ? __lock_acquire+0x1295/0x1ff0
[ 3483.457506][ T27] ? rcu_read_lock_any_held+0xb3/0x160
[ 3483.467018][ T27] ? kmem_cache_alloc+0x128/0x280
[ 3483.472360][ T27] do_coredump+0x1852/0x31e0
[ 3483.476952][ T27] ? ____kasan_slab_free+0xd8/0x120
[ 3483.484407][ T27] ? slab_free_freelist_hook+0xdd/0x160
[ 3483.490165][ T27] ? nfs_ssc_unregister+0x30/0x30
[ 3483.495444][ T27] ? get_signal+0x8ac/0x14e0
[ 3483.500454][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3483.505659][ T27] ? _raw_spin_unlock_irq+0x1f/0x40
[ 3483.512912][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3483.518170][ T27] get_signal+0xc06/0x14e0
[ 3483.523391][ T27] arch_do_signal_or_restart+0xc3/0x1890
[ 3483.530691][ T27] ? force_sig_fault_to_task+0x1c0/0x1c0
[ 3483.538444][ T27] ? get_sigframe_size+0x10/0x10
[ 3483.544275][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 3483.551886][ T27] ? exit_to_user_mode_loop+0x39/0x130
[ 3483.557413][ T27] exit_to_user_mode_loop+0x97/0x130
[ 3483.565168][ T27] exit_to_user_mode_prepare+0xb1/0x140
[ 3483.570998][ T27] irqentry_exit_to_user_mode+0x5/0x40
[ 3483.576464][ T27] exc_page_fault+0x342/0x740
[ 3483.581554][ T27] asm_exc_page_fault+0x22/0x30
[ 3483.586412][ T27] RIP: 0033:0x0
[ 3483.590170][ T27] RSP: 002b:0000000020000508 EFLAGS: 00010217
[ 3483.596243][ T27] RAX: 0000000000000000 RBX: 00007f500ffccf80 RCX: 00007f500feadae9
[ 3483.604859][ T27] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000004000000
[ 3483.613261][ T27] RBP: 00007f500fef947a R08: 0000000020000600 R09: 0000000020000600
[ 3483.622618][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000
[ 3483.630868][ T27] R13: 000000000000000b R14: 00007f500ffccf80 R15: 00007ffd94b47ba8
[ 3483.639231][ T27]
[ 3483.646246][ T27] INFO: task syz-executor.3:20011 blocked for more than 144 seconds.
[ 3483.654519][ T27] Not tainted 5.15.132-syzkaller #0
[ 3483.660543][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 3483.669587][ T27] task:syz-executor.3 state:D stack:20824 pid:20011 ppid: 18837 flags:0x00004002
[ 3483.679045][ T27] Call Trace:
[ 3483.682327][ T27]
[ 3483.685264][ T27] __schedule+0x12c4/0x4590
[ 3483.690466][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 3483.696458][ T27] ? print_irqtrace_events+0x210/0x210
[ 3483.702462][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3483.707676][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130
[ 3483.713771][ T27] ? __sched_text_start+0x8/0x8
[ 3483.718613][ T27] ? __might_sleep+0xc0/0xc0
[ 3483.723539][ T27] ? prepare_to_wait_event+0x3aa/0x3e0
[ 3483.730429][ T27] schedule+0x11b/0x1f0
[ 3483.734601][ T27] wb_wait_for_completion+0x164/0x290
[ 3483.740334][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20
[ 3483.746935][ T27] ? init_wait_entry+0xd0/0xd0
[ 3483.752056][ T27] __writeback_inodes_sb_nr+0x2ce/0x370
[ 3483.757632][ T27] ? writeback_inodes_sb_nr+0x30/0x30
[ 3483.763359][ T27] ? down_read_trylock+0x24a/0x3b0
[ 3483.768480][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0
[ 3483.774722][ T27] ? cpumask_next+0xc3/0xf0
[ 3483.779491][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0
[ 3483.784787][ T27] try_to_writeback_inodes_sb+0x94/0xb0
[ 3483.790614][ T27] ext4_da_write_begin+0x228/0xb60
[ 3483.796770][ T27] ? jbd2_journal_start_reserved+0x300/0x300
[ 3483.804077][ T27] ? ext4_set_page_dirty+0x340/0x340
[ 3483.809722][ T27] ? rcu_is_watching+0x11/0xa0
[ 3483.814495][ T27] ? __mark_inode_dirty+0x3dd/0xd60
[ 3483.820202][ T27] generic_perform_write+0x2bf/0x5b0
[ 3483.825575][ T27] ? __mnt_drop_write_file+0xbe/0xf0
[ 3483.831371][ T27] ? grab_cache_page_write_begin+0x90/0x90
[ 3483.837267][ T27] ? ext4_write_checks+0x255/0x2c0
[ 3483.842582][ T27] ext4_buffered_write_iter+0x227/0x360
[ 3483.861065][ T27] ext4_file_write_iter+0x87c/0x1990
[ 3483.866445][ T27] ? _raw_spin_unlock+0x24/0x40
[ 3483.871607][ T27] ? follow_page_pte+0xad5/0xb60
[ 3483.876584][ T27] ? follow_page_mask+0xb59/0x13f0
[ 3483.881930][ T27] ? ext4_file_read_iter+0x6c0/0x6c0
[ 3483.887202][ T27] ? follow_page+0x130/0x130
[ 3483.892080][ T27] ? find_vma+0xd3/0x230
[ 3483.896325][ T27] ? check_vma_flags+0x407/0x490
[ 3483.901394][ T27] ? iov_iter_kvec+0x4a/0x170
[ 3483.906640][ T27] __kernel_write+0x5b1/0xa60
[ 3483.911473][ T27] ? vfs_read+0xe10/0xe10
[ 3483.915919][ T27] ? __lock_acquire+0x1ff0/0x1ff0
[ 3483.921049][ T27] ? down_read_killable+0x1d2/0x350
[ 3483.926298][ T27] __dump_emit+0x264/0x3a0
[ 3483.931496][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0
[ 3483.937006][ T27] ? dump_emit+0x152/0x3f0
[ 3483.941540][ T27] dump_user_range+0x91/0x320
[ 3483.946221][ T27] elf_core_dump+0x3c7d/0x4570
[ 3483.951060][ T27] ? reacquire_held_locks+0x660/0x660
[ 3483.956492][ T27] ? load_elf_library+0xa40/0xa40
[ 3483.961728][ T27] ? mark_lock+0x98/0x340
[ 3483.966059][ T27] ? __lock_acquire+0x1295/0x1ff0
[ 3483.972863][ T27] ? rcu_read_lock_any_held+0xb3/0x160
[ 3483.978349][ T27] ? kmem_cache_alloc+0x128/0x280
[ 3483.983681][ T27] do_coredump+0x1852/0x31e0
[ 3483.988276][ T27] ? ____kasan_slab_free+0xd8/0x120
[ 3483.993900][ T27] ? slab_free_freelist_hook+0xdd/0x160
[ 3483.999547][ T27] ? nfs_ssc_unregister+0x30/0x30
[ 3484.004609][ T27] ? get_signal+0x8ac/0x14e0
[ 3484.010235][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3484.015444][ T27] ? _raw_spin_unlock_irq+0x1f/0x40
[ 3484.020797][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3484.026024][ T27] get_signal+0xc06/0x14e0
[ 3484.030550][ T27] arch_do_signal_or_restart+0xc3/0x1890
[ 3484.036207][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3484.041454][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130
[ 3484.047385][ T27] ? _raw_spin_unlock+0x40/0x40
[ 3484.052310][ T27] ? get_sigframe_size+0x10/0x10
[ 3484.057293][ T27] ? force_sig_info_to_task+0x34a/0x470
[ 3484.062909][ T27] ? force_sig+0x114/0x1d0
[ 3484.067330][ T27] ? exit_to_user_mode_loop+0x39/0x130
[ 3484.072822][ T27] exit_to_user_mode_loop+0x97/0x130
[ 3484.078147][ T27] exit_to_user_mode_prepare+0xb1/0x140
[ 3484.083924][ T27] irqentry_exit_to_user_mode+0x5/0x40
[ 3484.090216][ T27] exc_general_protection+0x358/0x4f0
[ 3484.095607][ T27] ? vtime_user_enter+0x1ee/0x2d0
[ 3484.100828][ T27] ? __context_tracking_enter+0x5f/0x90
[ 3484.106380][ T27] asm_exc_general_protection+0x22/0x30
[ 3484.112471][ T27] RIP: 0033:0x7f2f179e8af1
[ 3484.116891][ T27] RSP: 002b:0000000020000540 EFLAGS: 00010217
[ 3484.123365][ T27] RAX: 0000000000000000 RBX: 00007f2f17b08050 RCX: 00007f2f179e8ae9
[ 3484.131601][ T27] RDX: 0000000020000580 RSI: 0000000020000540 RDI: 0000000004000000
[ 3484.139785][ T27] RBP: 00007f2f17a3447a R08: 0000000020000600 R09: 0000000020000600
[ 3484.147759][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000
[ 3484.156105][ T27] R13: 000000000000006e R14: 00007f2f17b08050 R15: 00007ffd6bf54f18
[ 3484.170250][ T27]
[ 3484.180011][ T27] INFO: task syz-executor.5:20030 blocked for more than 144 seconds.
[ 3484.188135][ T27] Not tainted 5.15.132-syzkaller #0
[ 3484.203515][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 3484.217635][ T27] task:syz-executor.5 state:D stack:21024 pid:20030 ppid: 11694 flags:0x00004002
[ 3484.226989][ T27] Call Trace:
[ 3484.233929][ T27]
[ 3484.237075][ T27] __schedule+0x12c4/0x4590
[ 3484.244892][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 3484.254297][ T27] ? print_irqtrace_events+0x210/0x210
[ 3484.260005][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3484.265207][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130
[ 3484.271445][ T27] ? __sched_text_start+0x8/0x8
[ 3484.276304][ T27] ? __might_sleep+0xc0/0xc0
[ 3484.281203][ T27] ? prepare_to_wait_event+0x3aa/0x3e0
[ 3484.286662][ T27] schedule+0x11b/0x1f0
[ 3484.294278][ T27] wb_wait_for_completion+0x164/0x290
[ 3484.303084][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20
[ 3484.310031][ T27] ? init_wait_entry+0xd0/0xd0
[ 3484.316128][ T27] __writeback_inodes_sb_nr+0x2ce/0x370
[ 3484.322845][ T27] ? writeback_inodes_sb_nr+0x30/0x30
[ 3484.328546][ T27] ? down_read_trylock+0x24a/0x3b0
[ 3484.340564][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0
[ 3484.346402][ T27] ? ktime_get_coarse_real_ts64+0x36/0x120
[ 3484.353913][ T27] ? cpumask_next+0xc3/0xf0
[ 3484.358429][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0
[ 3484.364068][ T27] try_to_writeback_inodes_sb+0x94/0xb0
[ 3484.370035][ T27] ext4_da_write_begin+0x228/0xb60
[ 3484.375760][ T27] ? ext4_set_page_dirty+0x340/0x340
[ 3484.384580][ T27] ? current_time+0x1af/0x2f0
[ 3484.390929][ T27] ? atime_needs_update+0x7b0/0x7b0
[ 3484.396462][ T27] generic_perform_write+0x2bf/0x5b0
[ 3484.403934][ T27] ? grab_cache_page_write_begin+0x90/0x90
[ 3484.413463][ T27] ? ext4_write_checks+0x255/0x2c0
[ 3484.427179][ T27] ext4_buffered_write_iter+0x227/0x360
[ 3484.434546][ T27] ext4_file_write_iter+0x87c/0x1990
[ 3484.442676][ T27] ? _raw_spin_unlock+0x24/0x40
[ 3484.447885][ T27] ? follow_page_pte+0xad5/0xb60
[ 3484.454561][ T27] ? follow_page_mask+0xb59/0x13f0
[ 3484.462484][ T27] ? ext4_file_read_iter+0x6c0/0x6c0
[ 3484.468087][ T27] ? follow_page+0x130/0x130
[ 3484.474351][ T27] ? find_vma+0xd3/0x230
[ 3484.480199][ T27] ? check_vma_flags+0x407/0x490
[ 3484.485442][ T27] ? iov_iter_kvec+0x4a/0x170
[ 3484.491103][ T27] __kernel_write+0x5b1/0xa60
[ 3484.495948][ T27] ? vfs_read+0xe10/0xe10
[ 3484.500631][ T27] ? __lock_acquire+0x1ff0/0x1ff0
[ 3484.505670][ T27] ? down_read_killable+0x1d2/0x350
[ 3484.511202][ T27] __dump_emit+0x264/0x3a0
[ 3484.515625][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0
[ 3484.523121][ T27] ? dump_emit+0x152/0x3f0
[ 3484.527554][ T27] dump_user_range+0x91/0x320
[ 3484.532541][ T27] elf_core_dump+0x3c7d/0x4570
[ 3484.537314][ T27] ? reacquire_held_locks+0x660/0x660
[ 3484.543046][ T27] ? load_elf_library+0xa40/0xa40
[ 3484.548081][ T27] ? mark_lock+0x98/0x340
[ 3484.552753][ T27] ? __lock_acquire+0x1295/0x1ff0
[ 3484.557819][ T27] ? rcu_read_lock_any_held+0xb3/0x160
[ 3484.563624][ T27] ? kmem_cache_alloc+0x128/0x280
[ 3484.568950][ T27] do_coredump+0x1852/0x31e0
[ 3484.573548][ T27] ? ____kasan_slab_free+0xd8/0x120
[ 3484.587196][ T27] ? slab_free_freelist_hook+0xdd/0x160
[ 3484.598693][ T27] ? nfs_ssc_unregister+0x30/0x30
[ 3484.605384][ T27] ? get_signal+0x8ac/0x14e0
[ 3484.618188][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3484.627703][ T27] ? _raw_spin_unlock_irq+0x1f/0x40
[ 3484.644758][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3484.650570][ T27] get_signal+0xc06/0x14e0
[ 3484.656487][ T27] arch_do_signal_or_restart+0xc3/0x1890
[ 3484.662698][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3484.670042][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130
[ 3484.675955][ T27] ? _raw_spin_unlock+0x40/0x40
[ 3484.681440][ T27] ? get_sigframe_size+0x10/0x10
[ 3484.692313][ T27] ? force_sig_info_to_task+0x34a/0x470
[ 3484.700242][ T27] ? force_sig+0x114/0x1d0
[ 3484.704941][ T27] ? exit_to_user_mode_loop+0x39/0x130
[ 3484.711022][ T27] exit_to_user_mode_loop+0x97/0x130
[ 3484.716549][ T27] exit_to_user_mode_prepare+0xb1/0x140
[ 3484.722416][ T27] irqentry_exit_to_user_mode+0x5/0x40
[ 3484.728100][ T27] exc_general_protection+0x358/0x4f0
[ 3484.733915][ T27] ? vtime_user_enter+0x1ee/0x2d0
[ 3484.740317][ T27] ? __context_tracking_enter+0x5f/0x90
[ 3484.745898][ T27] asm_exc_general_protection+0x22/0x30
[ 3484.751823][ T27] RIP: 0033:0x7f500feadaf1
[ 3484.756241][ T27] RSP: 002b:0000000020000540 EFLAGS: 00010217
[ 3484.762627][ T27] RAX: 0000000000000000 RBX: 00007f500ffccf80 RCX: 00007f500feadae9
[ 3484.770892][ T27] RDX: 0000000020000580 RSI: 0000000020000540 RDI: 0000000004000000
[ 3484.779100][ T27] RBP: 00007f500fef947a R08: 0000000020000600 R09: 0000000020000600
[ 3484.787071][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000
[ 3484.795272][ T27] R13: 000000000000000b R14: 00007f500ffccf80 R15: 00007ffd94b47ba8
[ 3484.803507][ T27]
[ 3484.806591][ T27] INFO: task syz-executor.3:20039 blocked for more than 145 seconds.
[ 3484.815144][ T27] Not tainted 5.15.132-syzkaller #0
[ 3484.825973][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 3484.837314][ T27] task:syz-executor.3 state:D stack:20448 pid:20039 ppid: 18837 flags:0x00004002
[ 3484.846861][ T27] Call Trace:
[ 3484.852904][ T27]
[ 3484.855853][ T27] __schedule+0x12c4/0x4590
[ 3484.861829][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 3484.867893][ T27] ? print_irqtrace_events+0x210/0x210
[ 3484.873806][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3484.879260][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130
[ 3484.885429][ T27] ? __sched_text_start+0x8/0x8
[ 3484.891395][ T27] ? __might_sleep+0xc0/0xc0
[ 3484.896044][ T27] ? prepare_to_wait_event+0x3aa/0x3e0
[ 3484.902239][ T27] schedule+0x11b/0x1f0
[ 3484.906408][ T27] wb_wait_for_completion+0x164/0x290
[ 3484.912537][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20
[ 3484.920122][ T27] ? init_wait_entry+0xd0/0xd0
[ 3484.925491][ T27] __writeback_inodes_sb_nr+0x2ce/0x370
[ 3484.937528][ T27] ? writeback_inodes_sb_nr+0x30/0x30
[ 3484.943183][ T27] ? down_read_trylock+0x24a/0x3b0
[ 3484.948303][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0
[ 3484.955099][ T27] ? cpumask_next+0xc3/0xf0
[ 3484.961926][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0
[ 3484.967303][ T27] try_to_writeback_inodes_sb+0x94/0xb0
[ 3484.973311][ T27] ext4_da_write_begin+0x228/0xb60
[ 3484.981954][ T27] ? jbd2_journal_start_reserved+0x300/0x300
[ 3484.988051][ T27] ? ext4_set_page_dirty+0x340/0x340
[ 3484.994118][ T27] ? rcu_is_watching+0x11/0xa0
[ 3485.000712][ T27] ? __mark_inode_dirty+0x3dd/0xd60
[ 3485.007862][ T27] generic_perform_write+0x2bf/0x5b0
[ 3485.018031][ T27] ? __mnt_drop_write_file+0xbe/0xf0
[ 3485.023690][ T27] ? grab_cache_page_write_begin+0x90/0x90
[ 3485.029866][ T27] ? ext4_write_checks+0x255/0x2c0
[ 3485.035327][ T27] ext4_buffered_write_iter+0x227/0x360
[ 3485.041242][ T27] ext4_file_write_iter+0x87c/0x1990
[ 3485.046530][ T27] ? _raw_spin_unlock+0x24/0x40
[ 3485.051715][ T27] ? follow_page_pte+0xad5/0xb60
[ 3485.056669][ T27] ? follow_page_mask+0xb59/0x13f0
[ 3485.062297][ T27] ? ext4_file_read_iter+0x6c0/0x6c0
[ 3485.068348][ T27] ? follow_page+0x130/0x130
[ 3485.075866][ T27] ? find_vma+0xd3/0x230
[ 3485.084601][ T27] ? check_vma_flags+0x407/0x490
[ 3485.091077][ T27] ? iov_iter_kvec+0x4a/0x170
[ 3485.095999][ T27] __kernel_write+0x5b1/0xa60
[ 3485.101119][ T27] ? vfs_read+0xe10/0xe10
[ 3485.105588][ T27] ? __lock_acquire+0x1ff0/0x1ff0
[ 3485.112162][ T27] ? down_read_killable+0x1d2/0x350
[ 3485.117379][ T27] __dump_emit+0x264/0x3a0
[ 3485.122136][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0
[ 3485.127597][ T27] ? dump_emit+0x152/0x3f0
[ 3485.132483][ T27] dump_user_range+0x91/0x320
[ 3485.137766][ T27] elf_core_dump+0x3c7d/0x4570
[ 3485.142872][ T27] ? reacquire_held_locks+0x660/0x660
[ 3485.148322][ T27] ? load_elf_library+0xa40/0xa40
[ 3485.153727][ T27] ? mark_lock+0x98/0x340
[ 3485.158063][ T27] ? __lock_acquire+0x1295/0x1ff0
[ 3485.163482][ T27] ? rcu_read_lock_any_held+0xb3/0x160
[ 3485.169297][ T27] ? kmem_cache_alloc+0x128/0x280
[ 3485.174410][ T27] do_coredump+0x1852/0x31e0
[ 3485.181047][ T27] ? ____kasan_slab_free+0xd8/0x120
[ 3485.186261][ T27] ? slab_free_freelist_hook+0xdd/0x160
[ 3485.192526][ T27] ? nfs_ssc_unregister+0x30/0x30
[ 3485.197703][ T27] ? get_signal+0x8ac/0x14e0
[ 3485.206447][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3485.212006][ T27] ? _raw_spin_unlock_irq+0x1f/0x40
[ 3485.223675][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3485.230045][ T27] get_signal+0xc06/0x14e0
[ 3485.234481][ T27] arch_do_signal_or_restart+0xc3/0x1890
[ 3485.240415][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3485.245628][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130
[ 3485.251594][ T27] ? _raw_spin_unlock+0x40/0x40
[ 3485.256453][ T27] ? get_sigframe_size+0x10/0x10
[ 3485.261482][ T27] ? force_sig_info_to_task+0x34a/0x470
[ 3485.267043][ T27] ? force_sig+0x114/0x1d0
[ 3485.271513][ T27] ? exit_to_user_mode_loop+0x39/0x130
[ 3485.276975][ T27] exit_to_user_mode_loop+0x97/0x130
[ 3485.282308][ T27] exit_to_user_mode_prepare+0xb1/0x140
[ 3485.287849][ T27] irqentry_exit_to_user_mode+0x5/0x40
[ 3485.293543][ T27] exc_general_protection+0x358/0x4f0
[ 3485.307652][ T27] ? vtime_user_enter+0x1ee/0x2d0
[ 3485.315170][ T27] ? __context_tracking_enter+0x5f/0x90
[ 3485.326607][ T27] asm_exc_general_protection+0x22/0x30
[ 3485.333671][ T27] RIP: 0033:0x7f2f179e8af1
[ 3485.339123][ T27] RSP: 002b:0000000020000540 EFLAGS: 00010217
[ 3485.345230][ T27] RAX: 0000000000000000 RBX: 00007f2f17b07f80 RCX: 00007f2f179e8ae9
[ 3485.358527][ T27] RDX: 0000000020000580 RSI: 0000000020000540 RDI: 0000000004000000
[ 3485.370647][ T27] RBP: 00007f2f17a3447a R08: 0000000020000600 R09: 0000000020000600
[ 3485.378816][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000
[ 3485.386862][ T27] R13: 000000000000000b R14: 00007f2f17b07f80 R15: 00007ffd6bf54f18
[ 3485.394983][ T27]
[ 3485.398067][ T27] INFO: task syz-executor.3:20069 blocked for more than 145 seconds.
[ 3485.406506][ T27] Not tainted 5.15.132-syzkaller #0
[ 3485.414135][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 3485.423490][ T27] task:syz-executor.3 state:D stack:21024 pid:20069 ppid: 18837 flags:0x00004002
[ 3485.432949][ T27] Call Trace:
[ 3485.436231][ T27]
[ 3485.439377][ T27] __schedule+0x12c4/0x4590
[ 3485.444053][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 3485.458324][ T27] ? print_irqtrace_events+0x210/0x210
[ 3485.464020][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3485.471970][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130
[ 3485.478439][ T27] ? __sched_text_start+0x8/0x8
[ 3485.483351][ T27] ? __might_sleep+0xc0/0xc0
[ 3485.487935][ T27] ? prepare_to_wait_event+0x3aa/0x3e0
[ 3485.493509][ T27] schedule+0x11b/0x1f0
[ 3485.497672][ T27] wb_wait_for_completion+0x164/0x290
[ 3485.504265][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20
[ 3485.511034][ T27] ? init_wait_entry+0xd0/0xd0
[ 3485.516179][ T27] __writeback_inodes_sb_nr+0x2ce/0x370
[ 3485.524158][ T27] ? writeback_inodes_sb_nr+0x30/0x30
[ 3485.531607][ T27] ? down_read_trylock+0x24a/0x3b0
[ 3485.536992][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0
[ 3485.542758][ T27] ? cpumask_next+0xc3/0xf0
[ 3485.547461][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0
[ 3485.552839][ T27] try_to_writeback_inodes_sb+0x94/0xb0
[ 3485.558391][ T27] ext4_da_write_begin+0x228/0xb60
[ 3485.563762][ T27] ? jbd2_journal_start_reserved+0x300/0x300
[ 3485.573250][ T27] ? ext4_set_page_dirty+0x340/0x340
[ 3485.578568][ T27] ? rcu_is_watching+0x11/0xa0
[ 3485.583393][ T27] ? __mark_inode_dirty+0x3dd/0xd60
[ 3485.588594][ T27] generic_perform_write+0x2bf/0x5b0
[ 3485.593932][ T27] ? __mnt_drop_write_file+0xbe/0xf0
[ 3485.599350][ T27] ? grab_cache_page_write_begin+0x90/0x90
[ 3485.605167][ T27] ? ext4_write_checks+0x255/0x2c0
[ 3485.610732][ T27] ext4_buffered_write_iter+0x227/0x360
[ 3485.616337][ T27] ext4_file_write_iter+0x87c/0x1990
[ 3485.621726][ T27] ? _raw_spin_unlock+0x24/0x40
[ 3485.626582][ T27] ? follow_page_pte+0xad5/0xb60
[ 3485.632649][ T27] ? follow_page_mask+0xb59/0x13f0
[ 3485.638934][ T27] ? ext4_file_read_iter+0x6c0/0x6c0
[ 3485.644231][ T27] ? follow_page+0x130/0x130
[ 3485.650391][ T27] ? find_vma+0xd3/0x230
[ 3485.657288][ T27] ? check_vma_flags+0x407/0x490
[ 3485.662694][ T27] ? iov_iter_kvec+0x4a/0x170
[ 3485.667462][ T27] __kernel_write+0x5b1/0xa60
[ 3485.672359][ T27] ? vfs_read+0xe10/0xe10
[ 3485.676676][ T27] ? __lock_acquire+0x1ff0/0x1ff0
[ 3485.682060][ T27] ? down_read_killable+0x1d2/0x350
[ 3485.687271][ T27] __dump_emit+0x264/0x3a0
[ 3485.691921][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0
[ 3485.697367][ T27] ? dump_emit+0x152/0x3f0
[ 3485.702169][ T27] dump_user_range+0x91/0x320
[ 3485.706863][ T27] elf_core_dump+0x3c7d/0x4570
[ 3485.711973][ T27] ? reacquire_held_locks+0x660/0x660
[ 3485.717381][ T27] ? load_elf_library+0xa40/0xa40
[ 3485.722819][ T27] ? mark_lock+0x98/0x340
[ 3485.727159][ T27] ? __lock_acquire+0x1295/0x1ff0
[ 3485.732571][ T27] ? rcu_read_lock_any_held+0xb3/0x160
[ 3485.738047][ T27] ? kmem_cache_alloc+0x128/0x280
[ 3485.745547][ T27] do_coredump+0x1852/0x31e0
[ 3485.751104][ T27] ? nfs_ssc_unregister+0x30/0x30
[ 3485.757855][ T27] ? __sched_text_start+0x8/0x8
[ 3485.767407][ T27] ? trace_hardirqs_on+0x30/0x80
[ 3485.773298][ T27] get_signal+0xc06/0x14e0
[ 3485.777736][ T27] arch_do_signal_or_restart+0xc3/0x1890
[ 3485.783799][ T27] ? __lock_acquire+0x1ff0/0x1ff0
[ 3485.789079][ T27] ? rcu_is_watching+0x11/0xa0
[ 3485.793855][ T27] ? get_sigframe_size+0x10/0x10
[ 3485.799129][ T27] ? force_sig_info_to_task+0x34a/0x470
[ 3485.804687][ T27] ? exit_to_user_mode_loop+0x39/0x130
[ 3485.810475][ T27] exit_to_user_mode_loop+0x97/0x130
[ 3485.815772][ T27] exit_to_user_mode_prepare+0xb1/0x140
[ 3485.821678][ T27] irqentry_exit_to_user_mode+0x5/0x40
[ 3485.827147][ T27] exc_general_protection+0x358/0x4f0
[ 3485.833011][ T27] ? vtime_user_enter+0x1ee/0x2d0
[ 3485.840907][ T27] ? __context_tracking_enter+0x5f/0x90
[ 3485.846472][ T27] asm_exc_general_protection+0x22/0x30
[ 3485.857224][ T27] RIP: 0033:0x7f2f179e8af1
[ 3485.861725][ T27] RSP: 002b:0000000020000540 EFLAGS: 00010217
[ 3485.867864][ T27] RAX: 0000000000000000 RBX: 00007f2f17b07f80 RCX: 00007f2f179e8ae9
[ 3485.875941][ T27] RDX: 0000000020000580 RSI: 0000000020000540 RDI: 0000000004000000
[ 3485.884085][ T27] RBP: 00007f2f17a3447a R08: 0000000020000600 R09: 0000000020000600
[ 3485.892183][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000
[ 3485.900332][ T27] R13: 000000000000000b R14: 00007f2f17b07f80 R15: 00007ffd6bf54f18
[ 3485.908419][ T27]
[ 3485.911661][ T27] INFO: task syz-executor.2:20088 blocked for more than 146 seconds.
[ 3485.919884][ T27] Not tainted 5.15.132-syzkaller #0
[ 3485.925630][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 3485.934723][ T27] task:syz-executor.2 state:D stack:20568 pid:20088 ppid: 18888 flags:0x00004002
[ 3485.944106][ T27] Call Trace:
[ 3485.947459][ T27]
[ 3485.952429][ T27] __schedule+0x12c4/0x4590
[ 3485.961746][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 3485.967794][ T27] ? print_irqtrace_events+0x210/0x210
[ 3485.973598][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3485.979310][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130
[ 3485.985256][ T27] ? __sched_text_start+0x8/0x8
[ 3485.990538][ T27] ? __might_sleep+0xc0/0xc0
[ 3485.995261][ T27] ? prepare_to_wait_event+0x3aa/0x3e0
[ 3486.001331][ T27] schedule+0x11b/0x1f0
[ 3486.005552][ T27] wb_wait_for_completion+0x164/0x290
[ 3486.012134][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20
[ 3486.018989][ T27] ? init_wait_entry+0xd0/0xd0
[ 3486.023859][ T27] __writeback_inodes_sb_nr+0x2ce/0x370
[ 3486.029917][ T27] ? writeback_inodes_sb_nr+0x30/0x30
[ 3486.035299][ T27] ? down_read_trylock+0x24a/0x3b0
[ 3486.040826][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0
[ 3486.046599][ T27] ? cpumask_next+0xc3/0xf0
[ 3486.051428][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0
[ 3486.057416][ T27] try_to_writeback_inodes_sb+0x94/0xb0
[ 3486.064971][ T27] ext4_da_write_begin+0x228/0xb60
[ 3486.071426][ T27] ? jbd2_journal_start_reserved+0x300/0x300
[ 3486.077453][ T27] ? ext4_set_page_dirty+0x340/0x340
[ 3486.084158][ T27] ? rcu_is_watching+0x11/0xa0
[ 3486.102580][ T27] ? __mark_inode_dirty+0x3dd/0xd60
[ 3486.107823][ T27] generic_perform_write+0x2bf/0x5b0
[ 3486.113509][ T27] ? __mnt_drop_write_file+0xbe/0xf0
[ 3486.119049][ T27] ? grab_cache_page_write_begin+0x90/0x90
[ 3486.124863][ T27] ? ext4_write_checks+0x255/0x2c0
[ 3486.130279][ T27] ext4_buffered_write_iter+0x227/0x360
[ 3486.135836][ T27] ext4_file_write_iter+0x87c/0x1990
[ 3486.141412][ T27] ? _raw_spin_unlock+0x24/0x40
[ 3486.146266][ T27] ? follow_page_pte+0xad5/0xb60
[ 3486.151494][ T27] ? follow_page_mask+0xb59/0x13f0
[ 3486.156642][ T27] ? ext4_file_read_iter+0x6c0/0x6c0
[ 3486.162682][ T27] ? follow_page+0x130/0x130
[ 3486.167279][ T27] ? find_vma+0xd3/0x230
[ 3486.171861][ T27] ? check_vma_flags+0x407/0x490
[ 3486.176825][ T27] ? iov_iter_kvec+0x4a/0x170
[ 3486.181836][ T27] __kernel_write+0x5b1/0xa60
[ 3486.186558][ T27] ? vfs_read+0xe10/0xe10
[ 3486.193790][ T27] ? __lock_acquire+0x1ff0/0x1ff0
[ 3486.199274][ T27] ? down_read_killable+0x1d2/0x350
[ 3486.204586][ T27] __dump_emit+0x264/0x3a0
[ 3486.209393][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0
[ 3486.215871][ T27] ? dump_emit+0x152/0x3f0
[ 3486.220624][ T27] dump_user_range+0x91/0x320
[ 3486.225381][ T27] elf_core_dump+0x3c7d/0x4570
[ 3486.232346][ T27] ? reacquire_held_locks+0x660/0x660
[ 3486.239042][ T27] ? load_elf_library+0xa40/0xa40
[ 3486.244209][ T27] ? mark_lock+0x98/0x340
[ 3486.248566][ T27] ? __lock_acquire+0x1295/0x1ff0
[ 3486.256277][ T27] ? rcu_read_lock_any_held+0xb3/0x160
[ 3486.263789][ T27] ? kmem_cache_alloc+0x128/0x280
[ 3486.269001][ T27] do_coredump+0x1852/0x31e0
[ 3486.273640][ T27] ? ____kasan_slab_free+0xd8/0x120
[ 3486.280790][ T27] ? slab_free_freelist_hook+0xdd/0x160
[ 3486.286358][ T27] ? nfs_ssc_unregister+0x30/0x30
[ 3486.291831][ T27] ? get_signal+0x8ac/0x14e0
[ 3486.296433][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3486.305175][ T27] ? _raw_spin_unlock_irq+0x1f/0x40
[ 3486.310614][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3486.317752][ T27] get_signal+0xc06/0x14e0
[ 3486.322611][ T27] arch_do_signal_or_restart+0xc3/0x1890
[ 3486.328298][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3486.334022][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130
[ 3486.340271][ T27] ? _raw_spin_unlock+0x40/0x40
[ 3486.345235][ T27] ? get_sigframe_size+0x10/0x10
[ 3486.350629][ T27] ? force_sig_info_to_task+0x34a/0x470
[ 3486.356193][ T27] ? force_sig+0x114/0x1d0
[ 3486.360934][ T27] ? exit_to_user_mode_loop+0x39/0x130
[ 3486.367002][ T27] exit_to_user_mode_loop+0x97/0x130
[ 3486.372624][ T27] exit_to_user_mode_prepare+0xb1/0x140
[ 3486.378275][ T27] irqentry_exit_to_user_mode+0x5/0x40
[ 3486.384331][ T27] exc_general_protection+0x358/0x4f0
[ 3486.393452][ T27] ? vtime_user_enter+0x1ee/0x2d0
[ 3486.399638][ T27] ? __context_tracking_enter+0x5f/0x90
[ 3486.406215][ T27] asm_exc_general_protection+0x22/0x30
[ 3486.412423][ T27] RIP: 0033:0x7f9203541af1
[ 3486.416911][ T27] RSP: 002b:0000000020000540 EFLAGS: 00010217
[ 3486.423383][ T27] RAX: 0000000000000000 RBX: 00007f9203660f80 RCX: 00007f9203541ae9
[ 3486.431768][ T27] RDX: 0000000020000580 RSI: 0000000020000540 RDI: 0000000004000000
[ 3486.439984][ T27] RBP: 00007f920358d47a R08: 0000000020000600 R09: 0000000020000600
[ 3486.448026][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000
[ 3486.456432][ T27] R13: 000000000000000b R14: 00007f9203660f80 R15: 00007fff47d50bf8
[ 3486.465704][ T27]
[ 3486.469256][ T27] INFO: task syz-executor.5:20103 blocked for more than 146 seconds.
[ 3486.477362][ T27] Not tainted 5.15.132-syzkaller #0
[ 3486.483607][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 3486.492712][ T27] task:syz-executor.5 state:D stack:21272 pid:20103 ppid: 11694 flags:0x00004002
[ 3486.504004][ T27] Call Trace:
[ 3486.507328][ T27]
[ 3486.519458][ T27] __schedule+0x12c4/0x4590
[ 3486.524008][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 3486.530811][ T27] ? print_irqtrace_events+0x210/0x210
[ 3486.536327][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3486.541897][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130
[ 3486.547861][ T27] ? __sched_text_start+0x8/0x8
[ 3486.553066][ T27] ? __might_sleep+0xc0/0xc0
[ 3486.557674][ T27] ? prepare_to_wait_event+0x3aa/0x3e0
[ 3486.563449][ T27] schedule+0x11b/0x1f0
[ 3486.569874][ T27] wb_wait_for_completion+0x164/0x290
[ 3486.576366][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20
[ 3486.583059][ T27] ? init_wait_entry+0xd0/0xd0
[ 3486.587832][ T27] __writeback_inodes_sb_nr+0x2ce/0x370
[ 3486.593426][ T27] ? writeback_inodes_sb_nr+0x30/0x30
[ 3486.598834][ T27] ? down_read_trylock+0x24a/0x3b0
[ 3486.603946][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0
[ 3486.609750][ T27] ? cpumask_next+0xc3/0xf0
[ 3486.614333][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0
[ 3486.619717][ T27] try_to_writeback_inodes_sb+0x94/0xb0
[ 3486.625274][ T27] ext4_da_write_begin+0x228/0xb60
[ 3486.631548][ T27] ? jbd2_journal_start_reserved+0x300/0x300
[ 3486.637536][ T27] ? ext4_set_page_dirty+0x340/0x340
[ 3486.642897][ T27] ? rcu_is_watching+0x11/0xa0
[ 3486.647664][ T27] ? __mark_inode_dirty+0x3dd/0xd60
[ 3486.652899][ T27] generic_perform_write+0x2bf/0x5b0
[ 3486.658198][ T27] ? __mnt_drop_write_file+0xbe/0xf0
[ 3486.663556][ T27] ? grab_cache_page_write_begin+0x90/0x90
[ 3486.669452][ T27] ? ext4_write_checks+0x255/0x2c0
[ 3486.674790][ T27] ext4_buffered_write_iter+0x227/0x360
[ 3486.680388][ T27] ext4_file_write_iter+0x87c/0x1990
[ 3486.685677][ T27] ? _raw_spin_unlock+0x24/0x40
[ 3486.690605][ T27] ? follow_page_pte+0xad5/0xb60
[ 3486.695561][ T27] ? follow_page_mask+0xb59/0x13f0
[ 3486.700882][ T27] ? ext4_file_read_iter+0x6c0/0x6c0
[ 3486.707146][ T27] ? follow_page+0x130/0x130
[ 3486.713577][ T27] ? find_vma+0xd3/0x230
[ 3486.717888][ T27] ? check_vma_flags+0x407/0x490
[ 3486.724631][ T27] ? iov_iter_kvec+0x4a/0x170
[ 3486.730920][ T27] __kernel_write+0x5b1/0xa60
[ 3486.735644][ T27] ? vfs_read+0xe10/0xe10
[ 3486.740440][ T27] ? __lock_acquire+0x1ff0/0x1ff0
[ 3486.745541][ T27] ? down_read_killable+0x1d2/0x350
[ 3486.750835][ T27] __dump_emit+0x264/0x3a0
[ 3486.755303][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0
[ 3486.760868][ T27] ? dump_emit+0x152/0x3f0
[ 3486.765436][ T27] dump_user_range+0x91/0x320
[ 3486.772675][ T27] elf_core_dump+0x3c7d/0x4570
[ 3486.780570][ T27] ? reacquire_held_locks+0x660/0x660
[ 3486.786064][ T27] ? load_elf_library+0xa40/0xa40
[ 3486.791533][ T27] ? mark_lock+0x98/0x340
[ 3486.795964][ T27] ? __lock_acquire+0x1295/0x1ff0
[ 3486.807289][ T27] ? rcu_read_lock_any_held+0xb3/0x160
[ 3486.812996][ T27] ? kmem_cache_alloc+0x128/0x280
[ 3486.818038][ T27] do_coredump+0x1852/0x31e0
[ 3486.822857][ T27] ? ____kasan_slab_free+0xd8/0x120
[ 3486.828039][ T27] ? slab_free_freelist_hook+0xdd/0x160
[ 3486.833913][ T27] ? nfs_ssc_unregister+0x30/0x30
[ 3486.839217][ T27] ? get_signal+0x8ac/0x14e0
[ 3486.843820][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3486.850411][ T27] ? _raw_spin_unlock_irq+0x1f/0x40
[ 3486.855625][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3486.861114][ T27] get_signal+0xc06/0x14e0
[ 3486.865553][ T27] arch_do_signal_or_restart+0xc3/0x1890
[ 3486.871672][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3486.877173][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130
[ 3486.884367][ T27] ? _raw_spin_unlock+0x40/0x40
[ 3486.889812][ T27] ? get_sigframe_size+0x10/0x10
[ 3486.894844][ T27] ? force_sig_info_to_task+0x34a/0x470
[ 3486.905235][ T27] ? force_sig+0x114/0x1d0
[ 3486.909849][ T27] ? exit_to_user_mode_loop+0x39/0x130
[ 3486.915362][ T27] exit_to_user_mode_loop+0x97/0x130
[ 3486.920798][ T27] exit_to_user_mode_prepare+0xb1/0x140
[ 3486.926390][ T27] irqentry_exit_to_user_mode+0x5/0x40
[ 3486.932122][ T27] exc_general_protection+0x358/0x4f0
[ 3486.937513][ T27] ? vtime_user_enter+0x1ee/0x2d0
[ 3486.944273][ T27] ? __context_tracking_enter+0x5f/0x90
[ 3486.950564][ T27] asm_exc_general_protection+0x22/0x30
[ 3486.956220][ T27] RIP: 0033:0x7f500feadaf1
[ 3486.960980][ T27] RSP: 002b:0000000020000540 EFLAGS: 00010217
[ 3486.967263][ T27] RAX: 0000000000000000 RBX: 00007f500ffccf80 RCX: 00007f500feadae9
[ 3486.975560][ T27] RDX: 0000000020000580 RSI: 0000000020000540 RDI: 0000000004000000
[ 3486.984404][ T27] RBP: 00007f500fef947a R08: 0000000020000600 R09: 0000000020000600
[ 3486.992787][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000
[ 3487.001122][ T27] R13: 000000000000000b R14: 00007f500ffccf80 R15: 00007ffd94b47ba8
[ 3487.009504][ T27]
[ 3487.012584][ T27] INFO: task syz-executor.3:20119 blocked for more than 147 seconds.
[ 3487.021213][ T27] Not tainted 5.15.132-syzkaller #0
[ 3487.026992][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 3487.036157][ T27] task:syz-executor.3 state:D stack:21024 pid:20119 ppid: 18837 flags:0x00004002
[ 3487.045637][ T27] Call Trace:
[ 3487.051415][ T27]
[ 3487.054358][ T27] __schedule+0x12c4/0x4590
[ 3487.059784][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 3487.066011][ T27] ? print_irqtrace_events+0x210/0x210
[ 3487.071795][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3487.076996][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130
[ 3487.084313][ T27] ? __sched_text_start+0x8/0x8
[ 3487.089489][ T27] ? __might_sleep+0xc0/0xc0
[ 3487.094133][ T27] ? prepare_to_wait_event+0x3aa/0x3e0
[ 3487.100038][ T27] schedule+0x11b/0x1f0
[ 3487.104201][ T27] wb_wait_for_completion+0x164/0x290
[ 3487.109953][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20
[ 3487.116588][ T27] ? init_wait_entry+0xd0/0xd0
[ 3487.121667][ T27] __writeback_inodes_sb_nr+0x2ce/0x370
[ 3487.127266][ T27] ? writeback_inodes_sb_nr+0x30/0x30
[ 3487.133006][ T27] ? down_read_trylock+0x24a/0x3b0
[ 3487.138120][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0
[ 3487.144316][ T27] ? cpumask_next+0xc3/0xf0
[ 3487.149183][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0
[ 3487.154518][ T27] try_to_writeback_inodes_sb+0x94/0xb0
[ 3487.161978][ T27] ext4_da_write_begin+0x228/0xb60
[ 3487.167142][ T27] ? jbd2_journal_start_reserved+0x300/0x300
[ 3487.173644][ T27] ? ext4_set_page_dirty+0x340/0x340
[ 3487.179268][ T27] ? rcu_is_watching+0x11/0xa0
[ 3487.184675][ T27] ? __mark_inode_dirty+0x3dd/0xd60
[ 3487.190323][ T27] generic_perform_write+0x2bf/0x5b0
[ 3487.195658][ T27] ? __mnt_drop_write_file+0xbe/0xf0
[ 3487.201183][ T27] ? grab_cache_page_write_begin+0x90/0x90
[ 3487.207044][ T27] ? ext4_write_checks+0x255/0x2c0
[ 3487.212918][ T27] ext4_buffered_write_iter+0x227/0x360
[ 3487.218545][ T27] ext4_file_write_iter+0x87c/0x1990
[ 3487.224101][ T27] ? _raw_spin_unlock+0x24/0x40
[ 3487.229271][ T27] ? follow_page_pte+0xad5/0xb60
[ 3487.234291][ T27] ? follow_page_mask+0xb59/0x13f0
[ 3487.239523][ T27] ? ext4_file_read_iter+0x6c0/0x6c0
[ 3487.245045][ T27] ? follow_page+0x130/0x130
[ 3487.249695][ T27] ? find_vma+0xd3/0x230
[ 3487.254228][ T27] ? check_vma_flags+0x407/0x490
[ 3487.259215][ T27] ? iov_iter_kvec+0x4a/0x170
[ 3487.263892][ T27] __kernel_write+0x5b1/0xa60
[ 3487.268600][ T27] ? vfs_read+0xe10/0xe10
[ 3487.274002][ T27] ? __lock_acquire+0x1ff0/0x1ff0
[ 3487.285789][ T27] ? down_read_killable+0x1d2/0x350
[ 3487.291244][ T27] __dump_emit+0x264/0x3a0
[ 3487.295681][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0
[ 3487.301279][ T27] ? dump_emit+0x152/0x3f0
[ 3487.305779][ T27] dump_user_range+0x91/0x320
[ 3487.310534][ T27] elf_core_dump+0x3c7d/0x4570
[ 3487.315340][ T27] ? reacquire_held_locks+0x660/0x660
[ 3487.320783][ T27] ? load_elf_library+0xa40/0xa40
[ 3487.325849][ T27] ? mark_lock+0x98/0x340
[ 3487.330286][ T27] ? __lock_acquire+0x1295/0x1ff0
[ 3487.335388][ T27] ? rcu_read_lock_any_held+0xb3/0x160
[ 3487.340998][ T27] ? kmem_cache_alloc+0x128/0x280
[ 3487.346036][ T27] do_coredump+0x1852/0x31e0
[ 3487.350781][ T27] ? ____kasan_slab_free+0xd8/0x120
[ 3487.356105][ T27] ? slab_free_freelist_hook+0xdd/0x160
[ 3487.361791][ T27] ? nfs_ssc_unregister+0x30/0x30
[ 3487.366888][ T27] ? get_signal+0x8ac/0x14e0
[ 3487.371744][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3487.376947][ T27] ? _raw_spin_unlock_irq+0x1f/0x40
[ 3487.382573][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3487.388239][ T27] get_signal+0xc06/0x14e0
[ 3487.393104][ T27] arch_do_signal_or_restart+0xc3/0x1890
[ 3487.398897][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3487.404110][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130
[ 3487.410165][ T27] ? _raw_spin_unlock+0x40/0x40
[ 3487.415166][ T27] ? get_sigframe_size+0x10/0x10
[ 3487.420204][ T27] ? force_sig_info_to_task+0x34a/0x470
[ 3487.425809][ T27] ? force_sig+0x114/0x1d0
[ 3487.430293][ T27] ? exit_to_user_mode_loop+0x39/0x130
[ 3487.435804][ T27] exit_to_user_mode_loop+0x97/0x130
[ 3487.441248][ T27] exit_to_user_mode_prepare+0xb1/0x140
[ 3487.446858][ T27] irqentry_exit_to_user_mode+0x5/0x40
[ 3487.452414][ T27] exc_general_protection+0x358/0x4f0
[ 3487.457834][ T27] ? vtime_user_enter+0x1ee/0x2d0
[ 3487.462971][ T27] ? __context_tracking_enter+0x5f/0x90
[ 3487.468703][ T27] asm_exc_general_protection+0x22/0x30
[ 3487.474344][ T27] RIP: 0033:0x7f2f179e8af1
[ 3487.478854][ T27] RSP: 002b:0000000020000540 EFLAGS: 00010217
[ 3487.484969][ T27] RAX: 0000000000000000 RBX: 00007f2f17b07f80 RCX: 00007f2f179e8ae9
[ 3487.495277][ T27] RDX: 0000000020000580 RSI: 0000000020000540 RDI: 0000000004000000
[ 3487.503526][ T27] RBP: 00007f2f17a3447a R08: 0000000020000600 R09: 0000000020000600
[ 3487.512988][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000
[ 3487.521214][ T27] R13: 000000000000000b R14: 00007f2f17b07f80 R15: 00007ffd6bf54f18
[ 3487.537192][ T27]
[ 3487.540293][ T27] INFO: task syz-executor.3:20148 blocked for more than 148 seconds.
[ 3487.556867][ T27] Not tainted 5.15.132-syzkaller #0
[ 3487.562931][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 3487.571895][ T27] task:syz-executor.3 state:D stack:20576 pid:20148 ppid: 18837 flags:0x00004002
[ 3487.581306][ T27] Call Trace:
[ 3487.584578][ T27]
[ 3487.587506][ T27] __schedule+0x12c4/0x4590
[ 3487.592597][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 3487.598592][ T27] ? print_irqtrace_events+0x210/0x210
[ 3487.604431][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3487.609931][ T27] ? _raw_spin_unlock_irqrestore+0x8b/0x130
[ 3487.615914][ T27] ? __sched_text_start+0x8/0x8
[ 3487.622315][ T27] ? __might_sleep+0xc0/0xc0
[ 3487.626921][ T27] ? prepare_to_wait_event+0x3aa/0x3e0
[ 3487.632722][ T27] schedule+0x11b/0x1f0
[ 3487.636884][ T27] wb_wait_for_completion+0x164/0x290
[ 3487.642663][ T27] ? __bpf_trace_writeback_inode_template+0x20/0x20
[ 3487.649501][ T27] ? init_wait_entry+0xd0/0xd0
[ 3487.656075][ T27] __writeback_inodes_sb_nr+0x2ce/0x370
[ 3487.661784][ T27] ? writeback_inodes_sb_nr+0x30/0x30
[ 3487.667187][ T27] ? down_read_trylock+0x24a/0x3b0
[ 3487.674182][ T27] ? try_to_writeback_inodes_sb+0x1d/0xb0
[ 3487.680427][ T27] ? cpumask_next+0xc3/0xf0
[ 3487.685148][ T27] ? get_nr_dirty_inodes+0x25f/0x2e0
[ 3487.691220][ T27] try_to_writeback_inodes_sb+0x94/0xb0
[ 3487.697248][ T27] ext4_da_write_begin+0x228/0xb60
[ 3487.704376][ T27] ? jbd2_journal_start_reserved+0x300/0x300
[ 3487.711959][ T27] ? ext4_set_page_dirty+0x340/0x340
[ 3487.717384][ T27] ? rcu_is_watching+0x11/0xa0
[ 3487.723596][ T27] ? __mark_inode_dirty+0x3dd/0xd60
[ 3487.730201][ T27] generic_perform_write+0x2bf/0x5b0
[ 3487.735502][ T27] ? __mnt_drop_write_file+0xbe/0xf0
[ 3487.742286][ T27] ? grab_cache_page_write_begin+0x90/0x90
[ 3487.748195][ T27] ? ext4_write_checks+0x255/0x2c0
[ 3487.753710][ T27] ext4_buffered_write_iter+0x227/0x360
[ 3487.759616][ T27] ext4_file_write_iter+0x87c/0x1990
[ 3487.768548][ T27] ? _raw_spin_unlock+0x24/0x40
[ 3487.773540][ T27] ? follow_page_pte+0xad5/0xb60
[ 3487.778530][ T27] ? follow_page_mask+0xb59/0x13f0
[ 3487.783812][ T27] ? ext4_file_read_iter+0x6c0/0x6c0
[ 3487.789171][ T27] ? follow_page+0x130/0x130
[ 3487.793762][ T27] ? find_vma+0xd3/0x230
[ 3487.798539][ T27] ? check_vma_flags+0x407/0x490
[ 3487.803661][ T27] ? iov_iter_kvec+0x4a/0x170
[ 3487.808339][ T27] __kernel_write+0x5b1/0xa60
[ 3487.813130][ T27] ? vfs_read+0xe10/0xe10
[ 3487.817504][ T27] ? __lock_acquire+0x1ff0/0x1ff0
[ 3487.822584][ T27] ? down_read_killable+0x1d2/0x350
[ 3487.827833][ T27] __dump_emit+0x264/0x3a0
[ 3487.832505][ T27] ? wait_for_dump_helpers+0x3d0/0x3d0
[ 3487.848107][ T27] ? dump_emit+0x152/0x3f0
[ 3487.852764][ T27] dump_user_range+0x91/0x320
[ 3487.857635][ T27] elf_core_dump+0x3c7d/0x4570
[ 3487.862618][ T27] ? reacquire_held_locks+0x660/0x660
[ 3487.868189][ T27] ? load_elf_library+0xa40/0xa40
[ 3487.873273][ T27] ? mark_lock+0x98/0x340
[ 3487.877608][ T27] ? __lock_acquire+0x1295/0x1ff0
[ 3487.882748][ T27] ? rcu_read_lock_any_held+0xb3/0x160
[ 3487.888216][ T27] ? kmem_cache_alloc+0x128/0x280
[ 3487.893273][ T27] do_coredump+0x1852/0x31e0
[ 3487.897868][ T27] ? ____kasan_slab_free+0xd8/0x120
[ 3487.903320][ T27] ? slab_free_freelist_hook+0xdd/0x160
[ 3487.908970][ T27] ? nfs_ssc_unregister+0x30/0x30
[ 3487.914026][ T27] ? get_signal+0x8ac/0x14e0
[ 3487.918622][ T27] ? do_raw_spin_unlock+0x137/0x8b0
[ 3487.923865][ T27] ? _raw_spin_unlock_irq+0x1f/0x40
[ 3487.929455][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3487.935525][ T27] get_signal+0xc06/0x14e0
[ 3487.942432][ T27] arch_do_signal_or_restart+0xc3/0x1890
[ 3487.948079][ T27] ? lockdep_hardirqs_on+0x94/0x130
[ 3487.953427][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130
[ 3487.963330][ T27] ? _raw_spin_unlock+0x40/0x40
[ 3487.968198][ T27] ? get_sigframe_size+0x10/0x10
[ 3487.973227][ T27] ? force_sig_info_to_task+0x34a/0x470
[ 3487.978997][ T27] ? force_sig+0x114/0x1d0
[ 3487.983425][ T27] ? exit_to_user_mode_loop+0x39/0x130
[ 3487.989204][ T27] exit_to_user_mode_loop+0x97/0x130
[ 3487.994536][ T27] exit_to_user_mode_prepare+0xb1/0x140
[ 3488.000400][ T27] irqentry_exit_to_user_mode+0x5/0x40
[ 3488.006582][ T27] exc_general_protection+0x358/0x4f0
[ 3488.012422][ T27] ? vtime_user_enter+0x1ee/0x2d0
[ 3488.017457][ T27] ? __context_tracking_enter+0x5f/0x90
[ 3488.023521][ T27] asm_exc_general_protection+0x22/0x30
[ 3488.029404][ T27] RIP: 0033:0x7f2f179e8af1
[ 3488.033889][ T27] RSP: 002b:0000000020000540 EFLAGS: 00010217
[ 3488.040417][ T27] RAX: 0000000000000000 RBX: 00007f2f17b07f80 RCX: 00007f2f179e8ae9
[ 3488.049426][ T27] RDX: 0000000020000580 RSI: 0000000020000540 RDI: 0000000004000000
[ 3488.057694][ T27] RBP: 00007f2f17a3447a R08: 0000000020000600 R09: 0000000020000600
[ 3488.066541][ T27] R10: 00000000200005c0 R11: 0000000000000206 R12: 0000000000000000
[ 3488.078512][ T27] R13: 000000000000000b R14: 00007f2f17b07f80 R15: 00007ffd6bf54f18
[ 3488.087763][ T27]
[ 3488.092058][ T27]
[ 3488.092058][ T27] Showing all locks held in the system:
[ 3488.100322][ T27] 1 lock held by khungtaskd/27:
[ 3488.105506][ T27] #0: ffffffff8c91f0a0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30
[ 3488.115068][ T27] 2 locks held by getty/3262:
[ 3488.119979][ T27] #0: ffff88802526e098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70
[ 3488.129848][ T27] #1: ffffc900024a52e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0
[ 3488.139988][ T27] 3 locks held by kworker/u4:8/13833:
[ 3488.145353][ T27] #0: ffff8880141e4938 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0
[ 3488.156199][ T27] #1: ffffc9000639fd20 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0
[ 3488.168263][ T27] #2: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3488.180198][ T27] 3 locks held by syz-executor.3/18837:
[ 3488.185839][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: mnt_want_write+0x3b/0x80
[ 3488.195340][ T27] #1: ffff88803dbbbfc0 (&type->i_mutex_dir_key#4/1){+.+.}-{3:3}, at: do_unlinkat+0x260/0x940
[ 3488.206101][ T27] #2: ffff88804641d3b0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: vfs_unlink+0xe0/0x5f0
[ 3488.216485][ T27] 3 locks held by syz-executor.5/20003:
[ 3488.222255][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3488.231739][ T27] #1: ffff888070855da8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3488.243149][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3488.254396][ T27] 3 locks held by syz-executor.3/20011:
[ 3488.260272][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3488.272436][ T27] #1: ffff8880708517e0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3488.283810][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3488.296108][ T27] 1 lock held by syz-executor.1/20016:
[ 3488.303741][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3488.317625][ T27] 1 lock held by syz-executor.4/20028:
[ 3488.323246][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3488.334116][ T27] 3 locks held by syz-executor.5/20030:
[ 3488.340350][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3488.349743][ T27] #1: ffff88804ed0a1d8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3488.361178][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3488.372777][ T27] 3 locks held by syz-executor.3/20039:
[ 3488.378390][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3488.388006][ T27] #1: ffff88803de883f0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3488.400776][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3488.419531][ T27] 1 lock held by syz-executor.2/20059:
[ 3488.425053][ T27] 2 locks held by syz-executor.4/20067:
[ 3488.431007][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3488.441831][ T27] #1: ffff8880b9b39718 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140
[ 3488.452051][ T27] 3 locks held by syz-executor.3/20069:
[ 3488.457593][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3488.467177][ T27] #1: ffff88803e2103f0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3488.478761][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3488.490228][ T27] 3 locks held by syz-executor.2/20088:
[ 3488.498861][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3488.524494][ T27] #1: ffff88803dd321d8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3488.545931][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3488.563362][ T27] 1 lock held by syz-executor.1/20093:
[ 3488.586485][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3488.598343][ T27] 3 locks held by syz-executor.5/20103:
[ 3488.606369][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3488.618974][ T27] #1: ffff8880466fb5c8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3488.630668][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3488.642014][ T27] 1 lock held by syz-executor.4/20107:
[ 3488.647568][ T27] 1 lock held by syz-executor.0/20110:
[ 3488.653735][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3488.664572][ T27] 3 locks held by syz-executor.3/20119:
[ 3488.670430][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3488.680102][ T27] #1: ffff88804d0153b0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3488.691732][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3488.703147][ T27] 3 locks held by syz-executor.3/20148:
[ 3488.711253][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3488.722282][ T27] #1: ffff888031b5bfc0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3488.734149][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3488.745732][ T27] 1 lock held by syz-executor.1/20152:
[ 3488.779944][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3488.790761][ T27] 1 lock held by syz-executor.2/20156:
[ 3488.796218][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3488.807083][ T27] 1 lock held by syz-executor.1/20168:
[ 3488.813121][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3488.824169][ T27] 3 locks held by syz-executor.5/20184:
[ 3488.830463][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3488.841050][ T27] #1: ffff88803848dda8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3488.852639][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3488.863848][ T27] 1 lock held by syz-executor.1/20192:
[ 3488.877785][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3488.888576][ T27] 1 lock held by syz-executor.3/20195:
[ 3488.894323][ T27] 1 lock held by syz-executor.4/20200:
[ 3488.903263][ T27] 3 locks held by syz-executor.2/20204:
[ 3488.909068][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3488.918316][ T27] #1: ffff88803848f198 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3488.930499][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3488.942022][ T27] 3 locks held by syz-executor.5/20213:
[ 3488.947549][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3488.957573][ T27] #1: ffff88803df8b5c8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3488.969447][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3488.980758][ T27] 1 lock held by syz-executor.1/20221:
[ 3488.986214][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3488.996885][ T27] 3 locks held by syz-executor.3/20226:
[ 3489.002580][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.012007][ T27] #1: ffff88802c083fc0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.023372][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.036636][ T27] 1 lock held by syz-executor.1/20250:
[ 3489.053231][ T27] 3 locks held by syz-executor.5/20260:
[ 3489.063941][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.078303][ T27] #1: ffff88804641c9b8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.097105][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.111885][ T27] 3 locks held by syz-executor.3/20267:
[ 3489.117454][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.127121][ T27] #1: ffff88804641f198 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.153176][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.164581][ T27] 3 locks held by syz-executor.2/20277:
[ 3489.172557][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.182971][ T27] #1: ffff88803e29e7a0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.196434][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.207699][ T27] 1 lock held by syz-executor.1/20280:
[ 3489.213405][ T27] 3 locks held by syz-executor.5/20293:
[ 3489.219202][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.228854][ T27] #1: ffff88803dc7c9b8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.242442][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.253884][ T27] 1 lock held by syz-executor.3/20315:
[ 3489.275977][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3489.287834][ T27] 1 lock held by syz-executor.1/20317:
[ 3489.293890][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3489.306912][ T27] 1 lock held by syz-executor.1/20350:
[ 3489.315762][ T27] 3 locks held by syz-executor.3/20353:
[ 3489.324846][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.338032][ T27] #1: ffff88803e3617e0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.349880][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.361418][ T27] 1 lock held by syz-executor.0/20357:
[ 3489.367111][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3489.378153][ T27] 1 lock held by syz-executor.1/20399:
[ 3489.383885][ T27] 3 locks held by syz-executor.3/20404:
[ 3489.391971][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.401536][ T27] #1: ffff88803576c9b8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.413482][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.427797][ T27] 1 lock held by syz-executor.2/20408:
[ 3489.435299][ T27] 1 lock held by syz-executor.4/20426:
[ 3489.441220][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3489.452036][ T27] 1 lock held by syz-executor.1/20449:
[ 3489.457535][ T27] #0: ffff88807f172bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10
[ 3489.468496][ T27] 3 locks held by syz-executor.5/20459:
[ 3489.474393][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.483957][ T27] #1: ffff88803de917e0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.495733][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.509431][ T27] 3 locks held by syz-executor.3/20461:
[ 3489.515031][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.524824][ T27] #1: ffff88803e297198 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.536691][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.561675][ T27] 3 locks held by syz-executor.3/20498:
[ 3489.568438][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.578597][ T27] #1: ffff88803e345da8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.592636][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.603996][ T27] 3 locks held by syz-executor.5/20501:
[ 3489.617472][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.628219][ T27] #1: ffff88804ed0abd0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.641902][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.653273][ T27] 3 locks held by syz-executor.2/20521:
[ 3489.659206][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.669459][ T27] #1: ffff888031b597e0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.681139][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.692520][ T27] 3 locks held by syz-executor.3/20544:
[ 3489.698178][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.708925][ T27] #1: ffff888031b5dda8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.720719][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.733336][ T27] 3 locks held by syz-executor.5/20562:
[ 3489.739313][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.749036][ T27] #1: ffff88803848a1d8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.760640][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.772330][ T27] 3 locks held by syz-executor.2/20581:
[ 3489.777876][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.787454][ T27] #1: ffff8880708b67a0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.798956][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.810531][ T27] 3 locks held by syz-executor.3/20620:
[ 3489.818924][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.828244][ T27] #1: ffff88803dbbb5c8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.841194][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.853455][ T27] 3 locks held by syz-executor.2/20630:
[ 3489.859519][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.869275][ T27] #1: ffff88803dc78de8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.880897][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.892382][ T27] 3 locks held by syz-executor.3/20644:
[ 3489.898069][ T27] #0: ffff88807f170460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0
[ 3489.907807][ T27] #1: ffff88804641d3b0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360
[ 3489.919476][ T27] #2: ffff88807f1700e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0
[ 3489.930874][ T27]
[ 3489.933259][ T27] =============================================
[ 3489.933259][ T27]
[ 3489.942124][ T27] NMI backtrace for cpu 1
[ 3489.946456][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.132-syzkaller #0
[ 3489.954427][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3489.964457][ T27] Call Trace:
[ 3489.967713][ T27]
[ 3489.970632][ T27] dump_stack_lvl+0x1e3/0x2cb
[ 3489.975286][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d
[ 3489.980890][ T27] ? panic+0x84d/0x84d
[ 3489.984936][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0
[ 3489.990024][ T27] nmi_cpu_backtrace+0x46a/0x4a0
[ 3489.994939][ T27] ? __wake_up_klogd+0xd5/0x100
[ 3489.999774][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0
[ 3490.005924][ T27] ? _printk+0xd1/0x111
[ 3490.010060][ T27] ? panic+0x84d/0x84d
[ 3490.014101][ T27] ? __wake_up_klogd+0xcc/0x100
[ 3490.018928][ T27] ? panic+0x84d/0x84d
[ 3490.023003][ T27] ? __rcu_read_unlock+0x92/0x100
[ 3490.028000][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10
[ 3490.034111][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0
[ 3490.040081][ T27] watchdog+0xe72/0xeb0
[ 3490.044244][ T27] kthread+0x3f6/0x4f0
[ 3490.048284][ T27] ? hungtask_pm_notify+0x50/0x50
[ 3490.053286][ T27] ? kthread_blkcg+0xd0/0xd0
[ 3490.057875][ T27] ret_from_fork+0x1f/0x30
[ 3490.062320][ T27]
[ 3490.066316][ T27] Sending NMI from CPU 1 to CPUs 0:
[ 3490.072596][ C0] NMI backtrace for cpu 0
[ 3490.072607][ C0] CPU: 0 PID: 23973 Comm: kworker/u4:3 Not tainted 5.15.132-syzkaller #0
[ 3490.072624][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3490.072638][ C0] Workqueue: ext4-rsv-conversion ext4_end_io_rsv_work
[ 3490.072659][ C0] RIP: 0010:unwind_next_frame+0xb71/0x1fa0
[ 3490.072694][ C0] Code: 80 3c 08 00 48 8b 6c 24 08 74 12 48 89 ef e8 66 4f 91 00 48 b9 00 00 00 00 00 fc ff df 48 89 5d 00 48 8b 44 24 48 80 3c 08 00 <48> 8b 5c 24 40 4c 8b 74 24 10 74 12 48 89 df e8 3b 4f 91 00 48 b9
[ 3490.072706][ C0] RSP: 0018:ffffc9000488f528 EFLAGS: 00000246
[ 3490.072718][ C0] RAX: 1ffff92000911ecf RBX: ffffffff816dc4b3 RCX: dffffc0000000000
[ 3490.072730][ C0] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffffc9000488f6d8
[ 3490.072741][ C0] RBP: ffffc9000488f688 R08: 0000000000000007 R09: ffffc9000488f690
[ 3490.072751][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffffffff1cb07cf
[ 3490.072762][ C0] R13: 1ffffffff1cb07cf R14: ffffc90004888000 R15: ffffc9000488f640
[ 3490.072773][ C0] FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
[ 3490.072786][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3490.072796][ C0] CR2: 000056270c732680 CR3: 000000002406e000 CR4: 00000000003506f0
[ 3490.072810][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 3490.072819][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 3490.072828][ C0] Call Trace:
[ 3490.072832][ C0]
[ 3490.072838][ C0] ? nmi_cpu_backtrace+0x39f/0x4a0
[ 3490.072855][ C0] ? read_lock_is_recursive+0x10/0x10
[ 3490.072875][ C0] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0
[ 3490.072892][ C0] ? unknown_nmi_error+0xd0/0xd0
[ 3490.072914][ C0] ? nmi_cpu_backtrace_handler+0x8/0x10
[ 3490.072929][ C0] ? nmi_handle+0xf7/0x370
[ 3490.072945][ C0] ? unwind_next_frame+0xb71/0x1fa0
[ 3490.072960][ C0] ? default_do_nmi+0x62/0x150
[ 3490.072975][ C0] ? exc_nmi+0xab/0x120
[ 3490.072987][ C0] ? end_repeat_nmi+0x16/0x31
[ 3490.073005][ C0] ? stack_trace_save+0x113/0x1c0
[ 3490.073023][ C0] ? unwind_next_frame+0xb71/0x1fa0
[ 3490.073039][ C0] ? unwind_next_frame+0xb71/0x1fa0
[ 3490.073055][ C0] ? unwind_next_frame+0xb71/0x1fa0
[ 3490.073070][ C0]
[ 3490.073075][ C0]
[ 3490.073082][ C0] ? arch_stack_walk+0xdb/0x140
[ 3490.073145][ C0] __unwind_start+0x59d/0x720
[ 3490.073162][ C0] ? stack_trace_save+0x1c0/0x1c0
[ 3490.073176][ C0] arch_stack_walk+0xdb/0x140
[ 3490.073193][ C0] ? stack_trace_save+0x113/0x1c0
[ 3490.073209][ C0] stack_trace_save+0x113/0x1c0
[ 3490.073224][ C0] ? stack_trace_snprint+0xe0/0xe0
[ 3490.073238][ C0] ? stack_trace_snprint+0xe0/0xe0
[ 3490.073257][ C0] ? kmem_cache_free+0x91/0x1f0
[ 3490.073272][ C0] kasan_set_track+0x4b/0x80
[ 3490.073308][ C0] ? kasan_quarantine_put+0xd4/0x220
[ 3490.073347][ C0] kasan_set_free_info+0x1f/0x40
[ 3490.073361][ C0] ____kasan_slab_free+0xd8/0x120
[ 3490.073378][ C0] slab_free_freelist_hook+0xdd/0x160
[ 3490.073394][ C0] ? ext4_release_io_end+0x241/0x2c0
[ 3490.073411][ C0] kmem_cache_free+0x91/0x1f0
[ 3490.073428][ C0] ext4_release_io_end+0x241/0x2c0
[ 3490.073446][ C0] ext4_end_io_rsv_work+0x5d6/0x6e0
[ 3490.073464][ C0] ? print_irqtrace_events+0x210/0x210
[ 3490.073482][ C0] ? ext4_last_io_end_vec+0x70/0x70
[ 3490.073501][ C0] process_one_work+0x8a1/0x10c0
[ 3490.073525][ C0] ? worker_detach_from_pool+0x260/0x260
[ 3490.073542][ C0] ? _raw_spin_lock_irqsave+0x120/0x120
[ 3490.073557][ C0] ? kthread_data+0x4e/0xc0
[ 3490.073571][ C0] ? wq_worker_running+0x97/0x170
[ 3490.073586][ C0] worker_thread+0xaca/0x1280
[ 3490.073612][ C0] kthread+0x3f6/0x4f0
[ 3490.073629][ C0] ? rcu_lock_release+0x20/0x20
[ 3490.073644][ C0] ? kthread_blkcg+0xd0/0xd0
[ 3490.073658][ C0] ret_from_fork+0x1f/0x30
[ 3490.073680][ C0]
[ 3490.090277][ T27] Kernel panic - not syncing: hung_task: blocked tasks
[ 3490.090289][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.132-syzkaller #0
[ 3490.090308][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3490.090318][ T27] Call Trace:
[ 3490.090324][ T27]
[ 3490.090332][ T27] dump_stack_lvl+0x1e3/0x2cb
[ 3490.090357][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d
[ 3490.090377][ T27] ? panic+0x84d/0x84d
[ 3490.090404][ T27] panic+0x318/0x84d
[ 3490.090420][ T27] ? schedule_preempt_disabled+0x20/0x20
[ 3490.090440][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0
[ 3490.090461][ T27] ? fb_is_primary_device+0xcc/0xcc
[ 3490.090480][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10
[ 3490.090501][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0
[ 3490.090519][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0
[ 3490.090540][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0
[ 3490.090562][ T27] watchdog+0xeb0/0xeb0
[ 3490.090590][ T27] kthread+0x3f6/0x4f0
[ 3490.090606][ T27] ? hungtask_pm_notify+0x50/0x50
[ 3490.090623][ T27] ? kthread_blkcg+0xd0/0xd0
[ 3490.090640][ T27] ret_from_fork+0x1f/0x30
[ 3490.090670][ T27]
[ 3490.090822][ T27] Kernel Offset: disabled
[ 3490.569976][ T27] Rebooting in 86400 seconds..