000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:23:25 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:23:27 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d2") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:23:27 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d2") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:23:28 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d2") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1034.655054][T19762] bridge0: port 1(bridge_slave_0) entered blocking state [ 1034.672205][T19762] bridge0: port 1(bridge_slave_0) entered disabled state [ 1034.680503][T19762] device bridge_slave_0 entered promiscuous mode [ 1035.529899][T19762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1035.552214][T19762] bridge0: port 2(bridge_slave_1) entered disabled state [ 1035.560777][T19762] device bridge_slave_1 entered promiscuous mode 21:23:29 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:23:30 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:23:31 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1038.179801][T19762] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1038.215982][T19762] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 21:23:32 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:23:33 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1039.498766][T19762] team0: Port device team_slave_0 added 21:23:33 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1040.072414][ T3310] Bluetooth: hci2: command 0x0409 tx timeout 21:23:35 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:23:35 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1041.875610][T19762] team0: Port device team_slave_1 added [ 1042.142386][ T3558] Bluetooth: hci2: command 0x041b tx timeout 21:23:36 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:23:37 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:23:37 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1044.222395][T18439] Bluetooth: hci2: command 0x040f tx timeout [ 1044.382530][T18436] Bluetooth: hci3: command 0x0409 tx timeout [ 1044.406352][T19762] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1044.418642][T19762] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1044.467934][T19762] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 21:23:38 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1044.777955][T19762] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1044.796401][T19762] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1044.842219][T19762] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1045.197405][ T154] device hsr_slave_0 left promiscuous mode [ 1045.459787][ T154] device hsr_slave_1 left promiscuous mode [ 1045.581063][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1045.602340][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1045.636697][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1045.654725][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 21:23:39 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1045.724501][ T154] device bridge_slave_1 left promiscuous mode [ 1045.730713][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1046.156245][ T154] device bridge_slave_0 left promiscuous mode [ 1046.172283][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1046.304263][T16079] Bluetooth: hci2: command 0x0419 tx timeout [ 1046.462211][T16079] Bluetooth: hci3: command 0x041b tx timeout [ 1046.577665][ T154] device hsr_slave_0 left promiscuous mode 21:23:40 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1046.832280][ T154] device hsr_slave_1 left promiscuous mode 21:23:41 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1047.256478][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1047.584830][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1047.761086][ T154] device bridge_slave_1 left promiscuous mode [ 1047.767516][ T154] bridge0: port 2(bridge_slave_1) entered disabled state 21:23:41 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1048.042458][ T154] device bridge_slave_0 left promiscuous mode [ 1048.048672][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1048.245149][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1048.269510][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1048.284464][ T154] device bridge_slave_1 left promiscuous mode [ 1048.290795][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1048.552294][T16080] Bluetooth: hci3: command 0x040f tx timeout [ 1048.616322][ T154] device bridge_slave_0 left promiscuous mode [ 1048.627960][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 21:23:42 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1049.172325][ T154] device hsr_slave_0 left promiscuous mode 21:23:43 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1049.632317][ T154] device hsr_slave_1 left promiscuous mode [ 1049.869151][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 21:23:43 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(0x0, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1049.974157][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1050.074366][ T154] device bridge_slave_1 left promiscuous mode [ 1050.080705][ T154] bridge0: port 2(bridge_slave_1) entered disabled state 21:23:44 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(0x0, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1050.502649][ T154] device bridge_slave_0 left promiscuous mode [ 1050.508858][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1050.632289][T16079] Bluetooth: hci3: command 0x0419 tx timeout [ 1050.654823][ T154] device hsr_slave_0 left promiscuous mode [ 1050.668093][ T154] device hsr_slave_1 left promiscuous mode [ 1050.795921][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 21:23:44 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(0x0, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1050.846257][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1051.114337][ T154] device bridge_slave_1 left promiscuous mode [ 1051.120575][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1051.493317][ T154] device bridge_slave_0 left promiscuous mode [ 1051.499539][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 21:23:45 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:23:46 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1052.442339][ T154] device hsr_slave_0 left promiscuous mode 21:23:46 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1052.736685][ T154] device hsr_slave_1 left promiscuous mode [ 1053.014107][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1053.021659][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 21:23:47 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1053.241386][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1053.255923][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1053.296602][ T154] device bridge_slave_1 left promiscuous mode [ 1053.309193][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1053.952600][ T154] device bridge_slave_0 left promiscuous mode [ 1053.958831][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1054.018755][ T154] device hsr_slave_0 left promiscuous mode [ 1054.032784][ T154] device hsr_slave_1 left promiscuous mode [ 1054.042714][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1054.050183][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1054.108316][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1054.122260][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 21:23:48 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1054.401479][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.407816][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 1054.711113][ T154] device bridge_slave_1 left promiscuous mode [ 1054.722281][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1055.145549][ T154] device bridge_slave_0 left promiscuous mode [ 1055.151773][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 21:23:49 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:23:50 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x0, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1056.254594][ T154] device hsr_slave_0 left promiscuous mode [ 1056.582245][ T154] device hsr_slave_1 left promiscuous mode [ 1056.698749][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1056.761073][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 21:23:50 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x0, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1056.824612][ T154] device bridge_slave_1 left promiscuous mode [ 1056.830801][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.156351][ T154] device bridge_slave_0 left promiscuous mode [ 1057.166061][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 21:23:51 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x0, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1057.922470][ T154] device hsr_slave_0 left promiscuous mode [ 1057.932556][ T154] device hsr_slave_1 left promiscuous mode [ 1057.944216][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1057.965377][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1058.191043][ T154] device bridge_slave_1 left promiscuous mode [ 1058.212855][ T154] bridge0: port 2(bridge_slave_1) entered disabled state 21:23:52 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x0, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1058.326714][ T154] device bridge_slave_0 left promiscuous mode [ 1058.342183][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1058.363255][ T154] device hsr_slave_0 left promiscuous mode [ 1058.369639][ T154] device hsr_slave_1 left promiscuous mode [ 1058.382688][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1058.403259][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1058.586004][ T154] device bridge_slave_1 left promiscuous mode [ 1058.592333][ T154] bridge0: port 2(bridge_slave_1) entered disabled state 21:23:52 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x0, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:23:53 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x0, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1059.124595][ T154] device bridge_slave_0 left promiscuous mode [ 1059.130814][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 21:23:53 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x0, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1059.941590][ T154] device hsr_slave_0 left promiscuous mode [ 1060.524433][ T154] device hsr_slave_1 left promiscuous mode [ 1061.053168][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1061.264554][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1061.486528][ T154] device bridge_slave_1 left promiscuous mode [ 1061.499472][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1061.660899][ T154] device bridge_slave_0 left promiscuous mode [ 1061.671749][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 21:23:55 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x0, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1062.013988][ T154] device hsr_slave_0 left promiscuous mode [ 1062.110263][ T154] device hsr_slave_1 left promiscuous mode [ 1062.230260][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1062.254468][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1062.359157][ T154] device bridge_slave_1 left promiscuous mode [ 1062.365403][ T154] bridge0: port 2(bridge_slave_1) entered disabled state 21:23:56 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x0, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1062.696141][ T154] device bridge_slave_0 left promiscuous mode [ 1062.712309][ T154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1063.400473][ T154] device hsr_slave_0 left promiscuous mode [ 1063.410564][ T154] device hsr_slave_1 left promiscuous mode 21:23:57 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x0, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1063.453000][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1063.460520][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1063.486787][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1063.502929][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1063.512954][ T154] device bridge_slave_1 left promiscuous mode [ 1063.519485][ T154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1064.065184][ T154] device bridge_slave_0 left promiscuous mode [ 1064.071408][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 21:23:58 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x0, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1065.453107][ T154] device veth1_macvtap left promiscuous mode [ 1065.459283][ T154] device veth0_macvtap left promiscuous mode [ 1065.491324][ T154] device veth1_vlan left promiscuous mode [ 1065.497357][ T154] device veth0_vlan left promiscuous mode 21:23:59 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x0, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:00 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:01 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1067.443095][ T154] device veth1_macvtap left promiscuous mode [ 1067.449157][ T154] device veth0_macvtap left promiscuous mode [ 1067.474068][ T154] device veth1_vlan left promiscuous mode [ 1067.479878][ T154] device veth0_vlan left promiscuous mode 21:24:02 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1068.695577][ T154] device veth1_macvtap left promiscuous mode [ 1068.702993][ T154] device veth0_macvtap left promiscuous mode [ 1068.709066][ T154] device veth1_vlan left promiscuous mode [ 1068.729761][ T154] device veth0_vlan left promiscuous mode [ 1069.047394][ T154] device veth0_vlan left promiscuous mode [ 1069.058104][ T154] device veth1_macvtap left promiscuous mode [ 1069.071641][ T154] device veth0_macvtap left promiscuous mode [ 1069.092630][ T154] device veth1_vlan left promiscuous mode [ 1069.099220][ T154] device veth0_vlan left promiscuous mode 21:24:03 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:04 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:04 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:05 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:05 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:06 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:06 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:09 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:10 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:11 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:11 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:12 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:12 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:13 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:14 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:14 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1081.022168][T16079] Bluetooth: hci5: command 0x0409 tx timeout 21:24:15 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:16 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:16 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1083.102360][T18439] Bluetooth: hci5: command 0x041b tx timeout 21:24:17 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:18 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:19 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1085.182188][T14037] Bluetooth: hci5: command 0x040f tx timeout 21:24:19 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:20 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:21 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1087.262365][T14036] Bluetooth: hci5: command 0x0419 tx timeout 21:24:21 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1087.742273][T14037] Bluetooth: hci6: command 0x0409 tx timeout 21:24:22 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1089.822435][T14036] Bluetooth: hci6: command 0x041b tx timeout 21:24:24 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:24 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:25 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:25 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1091.902385][T14037] Bluetooth: hci6: command 0x040f tx timeout 21:24:26 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1093.982292][ T3554] Bluetooth: hci6: command 0x0419 tx timeout 21:24:28 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:29 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:30 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:30 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1097.604512][ T154] team0 (unregistering): Port device team_slave_1 removed 21:24:31 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1098.310969][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1098.655007][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:24:32 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:33 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1099.405570][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:24:33 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:34 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:35 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1102.112969][ T154] bond0 (unregistering): Released all slaves 21:24:36 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:37 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:38 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:39 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:40 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1106.142524][T14037] Bluetooth: hci7: command 0x0409 tx timeout 21:24:40 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:41 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:42 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1108.232171][T16080] Bluetooth: hci7: command 0x041b tx timeout 21:24:43 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1109.651039][ T154] team0 (unregistering): Port device team_slave_1 removed 21:24:43 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1110.307049][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1110.312516][ T3310] Bluetooth: hci7: command 0x040f tx timeout [ 1110.462265][T18439] Bluetooth: hci8: command 0x0409 tx timeout 21:24:44 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1110.932812][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:24:45 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1111.185628][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1111.562656][ T154] bond0 (unregistering): Released all slaves [ 1111.683620][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1111.708967][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1111.771231][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1111.829733][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:24:45 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:46 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1112.382388][ T3562] Bluetooth: hci7: command 0x0419 tx timeout [ 1112.552466][ T3562] Bluetooth: hci8: command 0x041b tx timeout 21:24:47 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1114.442967][ T154] bond0 (unregistering): Released all slaves [ 1114.632054][T16080] Bluetooth: hci8: command 0x040f tx timeout 21:24:48 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1115.074805][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1115.614063][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1115.842472][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.848787][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 21:24:50 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1116.742066][T16080] Bluetooth: hci8: command 0x0419 tx timeout [ 1116.943581][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:24:51 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x0, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1117.572777][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:24:52 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x0, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:52 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x0, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:52 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x0, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:53 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x0, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1120.492524][ T154] bond0 (unregistering): Released all slaves 21:24:54 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x0, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:55 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x0, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:55 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0x0, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:56 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0x0, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:57 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0x0, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:24:58 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x0, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1125.037479][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1125.361337][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1125.709193][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1126.083395][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:25:00 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x0, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:01 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x0, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1129.059214][ T154] bond0 (unregistering): Released all slaves 21:25:03 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x0, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:04 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x0, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:05 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x0, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:06 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0x0, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:06 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0x0, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1132.973948][ T154] team0 (unregistering): Port device team_slave_1 removed 21:25:07 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0x0, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1133.619190][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1134.255580][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:25:08 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x0, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1134.832569][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:25:08 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x0, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:09 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x0, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:10 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1136.920477][ T154] bond0 (unregistering): Released all slaves 21:25:11 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:12 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1138.392191][ T3562] Bluetooth: hci0: command 0x0406 tx timeout 21:25:12 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:13 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:14 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:15 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0x0, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:15 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0x0, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1142.229180][ T154] team0 (unregistering): Port device team_slave_1 removed 21:25:16 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0x0, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1142.572880][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1142.977507][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:25:17 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1143.322729][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:25:17 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1143.502506][ T3310] Bluetooth: hci4: command 0x0406 tx timeout 21:25:19 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:19 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(0x0, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:19 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(0x0, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1146.715781][ T154] bond0 (unregistering): Released all slaves 21:25:20 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(0x0, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1147.182673][T14036] Bluetooth: hci9: command 0x0409 tx timeout 21:25:21 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:22 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:23 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1149.262684][ T3554] Bluetooth: hci9: command 0x041b tx timeout 21:25:23 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x0, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:24 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x0, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1151.342396][T14036] Bluetooth: hci9: command 0x040f tx timeout 21:25:25 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x0, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1151.854440][ T154] team0 (unregistering): Port device team_slave_1 removed 21:25:26 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x0, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1152.955447][ T154] team0 (unregistering): Port device team_slave_0 removed 21:25:27 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x0, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1153.342632][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1153.422860][ T3554] Bluetooth: hci9: command 0x0419 tx timeout 21:25:27 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x0, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1153.762456][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1153.822332][ T3554] Bluetooth: hci10: command 0x0409 tx timeout 21:25:28 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x0, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1155.051321][ T154] bond0 (unregistering): Released all slaves 21:25:29 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x0, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:29 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x0, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1155.902334][ T3554] Bluetooth: hci10: command 0x041b tx timeout 21:25:31 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x0, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1157.982267][T14036] Bluetooth: hci10: command 0x040f tx timeout 21:25:32 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x0, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1158.282397][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1158.688113][ T154] team0 (unregistering): Port device team_slave_0 removed 21:25:32 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x0, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1159.193699][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1159.215238][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:25:33 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:33 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1160.062220][T14036] Bluetooth: hci10: command 0x0419 tx timeout 21:25:34 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1161.072921][ T154] bond0 (unregistering): Released all slaves 21:25:35 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:36 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1163.982472][T14036] Bluetooth: hci2: command 0x0406 tx timeout 21:25:38 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1165.224181][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1165.531349][ T154] team0 (unregistering): Port device team_slave_0 removed 21:25:39 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1166.270122][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:25:40 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1166.750731][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:25:41 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:42 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:42 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1169.102218][T14037] Bluetooth: hci3: command 0x0406 tx timeout 21:25:43 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1169.350890][ T154] bond0 (unregistering): Released all slaves 21:25:44 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:44 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:45 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:46 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1172.143275][T14037] Bluetooth: hci11: command 0x0409 tx timeout 21:25:46 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:46 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:47 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1174.222398][ T3554] Bluetooth: hci11: command 0x041b tx timeout [ 1174.286368][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1174.321295][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1174.347002][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1174.376317][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1174.944104][ T154] bond0 (unregistering): Released all slaves 21:25:48 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:49 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1176.302681][T18439] Bluetooth: hci11: command 0x040f tx timeout 21:25:50 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1176.862452][T16080] Bluetooth: hci12: command 0x0409 tx timeout [ 1177.272388][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 1177.278717][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 21:25:52 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1178.382527][ T3554] Bluetooth: hci11: command 0x0419 tx timeout 21:25:52 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1178.942519][ T3554] Bluetooth: hci12: command 0x041b tx timeout 21:25:53 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1179.879648][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1180.412832][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1180.607656][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 21:25:54 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1181.009828][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1181.022675][ T3554] Bluetooth: hci12: command 0x040f tx timeout 21:25:55 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:55 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1182.391987][ T154] bond0 (unregistering): Released all slaves 21:25:56 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:57 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1183.102504][T18439] Bluetooth: hci12: command 0x0419 tx timeout 21:25:57 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:58 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:25:59 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:26:00 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1186.586832][ T154] team0 (unregistering): Port device team_slave_1 removed [ 1187.228337][ T154] team0 (unregistering): Port device team_slave_0 removed [ 1187.328735][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1187.588946][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 21:26:01 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:26:03 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1190.161034][ T154] bond0 (unregistering): Released all slaves 21:26:04 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:26:05 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:26:06 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) 21:26:07 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1193.902701][ T27] INFO: task kworker/1:11:15604 blocked for more than 143 seconds. [ 1193.919331][ T27] Not tainted 5.15.151-syzkaller #0 [ 1193.925823][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1193.952170][ T27] task:kworker/1:11 state:D stack:24992 pid:15604 ppid: 2 flags:0x00004000 [ 1193.961404][ T27] Workqueue: events nsim_dev_trap_report_work [ 1193.982517][ T27] Call Trace: [ 1193.985816][ T27] [ 1193.988755][ T27] __schedule+0x12c4/0x45b0 [ 1194.002135][ T27] ? mark_lock+0x98/0x340 [ 1194.006542][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1194.032247][ T27] ? __sched_text_start+0x8/0x8 [ 1194.037118][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1194.052050][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1194.057276][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1194.072046][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1194.092205][ T27] schedule+0x11b/0x1f0 [ 1194.096386][ T27] schedule_preempt_disabled+0xf/0x20 [ 1194.101769][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1194.115160][ T27] ? nsim_dev_trap_report_work+0x56/0xab0 [ 1194.120907][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1194.126192][ T27] mutex_lock_nested+0x17/0x20 [ 1194.130959][ T27] nsim_dev_trap_report_work+0x56/0xab0 [ 1194.149948][ T27] ? print_irqtrace_events+0x210/0x210 [ 1194.162045][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1194.167966][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1194.182058][ T27] process_one_work+0x8a1/0x10c0 [ 1194.187085][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1194.202063][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1194.207626][ T27] ? kthread_data+0x4e/0xc0 [ 1194.212563][ T27] ? wq_worker_running+0x97/0x170 [ 1194.217599][ T27] worker_thread+0xaca/0x1280 [ 1194.232051][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1194.241519][ T27] kthread+0x3f6/0x4f0 [ 1194.246432][ T27] ? rcu_lock_release+0x20/0x20 21:26:08 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="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", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1194.251297][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1194.262061][ T27] ret_from_fork+0x1f/0x30 [ 1194.266524][ T27] [ 1194.269589][ T27] [ 1194.269589][ T27] Showing all locks held in the system: [ 1194.293934][ T27] 2 locks held by kworker/0:0/7: [ 1194.298883][ T27] #0: ffff888011c72138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1194.309868][ T27] #1: ffffc90000cc7d20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1194.332164][ T27] 1 lock held by khungtaskd/27: [ 1194.337045][ T27] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1194.346763][ T27] 4 locks held by kworker/u4:2/154: [ 1194.351966][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1194.362789][ T27] #1: ffffc900010cfd20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1194.380335][ T27] #2: ffffffff8d9cfd50 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1194.390431][ T27] #3: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: netdev_run_todo+0xa4f/0xc40 [ 1194.402095][ T27] 2 locks held by getty/3255: [ 1194.406807][ T27] #0: ffff888024466098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1194.422046][ T27] #1: ffffc9000229c2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1194.442063][ T27] 3 locks held by kworker/0:3/3310: [ 1194.447302][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1194.458063][ T27] #1: ffffc900012dfd20 ((work_completion)(&pwq->unbound_release_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1194.470869][ T27] #2: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1194.483924][ T27] 2 locks held by kworker/u4:5/3582: [ 1194.489761][ T27] 3 locks held by kworker/1:11/15604: [ 1194.502058][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1194.512837][ T27] #1: ffffc90003257d20 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1194.532043][ T27] #2: ffff888018673400 (&nsim_dev->port_list_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x56/0xab0 [ 1194.552063][ T27] 7 locks held by syz-executor.0/19727: [ 1194.557613][ T27] #0: ffff8880247b0460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x29a/0xe50 [ 1194.584238][ T27] #1: ffff88805fc49088 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0 [ 1194.594700][ T27] #2: ffff888147de7e88 (kn->active#233){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0 [ 1194.612046][ T27] #3: ffffffff8d357ac8 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xf1/0x470 [ 1194.616841][T22082] chnl_net:caif_netlink_parms(): no params data found [ 1194.642042][ T27] #4: ffff8880795b8178 (&dev->mutex){....}-{3:3}, at: device_release_driver_internal+0xc2/0x7f0 [ 1194.662308][ T27] #5: ffff888018673400 (&nsim_dev->port_list_lock){+.+.}-{3:3}, at: nsim_dev_reload_destroy+0x118/0x240 [ 1194.673918][ T27] #6: [ 1194.678462][T22028] chnl_net:caif_netlink_parms(): no params data found [ 1194.678530][ T27] ffff8880b9a27848 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x53d/0x810 [ 1194.693323][T22446] chnl_net:caif_netlink_parms(): no params data found [ 1194.699281][ T27] 4 locks held by syz-executor.3/19762: [ 1194.713962][ T27] #0: ffff888077ef4ff0 (&hdev->req_lock){+.+.}-{3:3}, at: hci_dev_do_close+0x63/0x1070 [ 1194.723872][ T27] #1: ffff888077ef4078 (&hdev->lock){+.+.}-{3:3}, at: hci_dev_do_close+0x431/0x1070 [ 1194.733432][ T27] #2: ffffffff8db24868 (hci_cb_list_lock){+.+.}-{3:3}, at: hci_conn_hash_flush+0xb8/0x220 [ 1194.745326][ T27] #3: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1194.756303][ T27] 3 locks held by syz-executor.2/20142: [ 1194.761840][ T27] #0: ffff88803e16cff0 (&hdev->req_lock){+.+.}-{3:3}, at: hci_dev_do_close+0x63/0x1070 [ 1194.771668][ T27] #1: ffff88803e16c078 (&hdev->lock){+.+.}-{3:3}, at: hci_dev_do_close+0x431/0x1070 [ 1194.781282][ T27] #2: ffffffff8db24868 (hci_cb_list_lock){+.+.}-{3:3}, at: hci_conn_hash_flush+0xb8/0x220 [ 1194.791910][ T27] 2 locks held by syz-executor.1/20265: [ 1194.797504][ T27] #0: ffffffff8d9cfd50 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x37b/0x5d0 [ 1194.807061][ T27] #1: ffffffff8c923bf0 (rcu_state.barrier_mutex){+.+.}-{3:3}, at: rcu_barrier+0x9c/0x4e0 [ 1194.817038][ T27] 1 lock held by syz-executor.0/22028: [ 1194.826092][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1194.835706][ T27] 1 lock held by syz-executor.3/22082: [ 1194.841157][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1194.850644][ T27] 1 lock held by syz-executor.2/22413: [ 1194.858016][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1194.867826][ T27] 2 locks held by syz-executor.4/22419: [ 1194.873444][ T27] 3 locks held by syz-executor.4/22423: [ 1194.879016][ T27] 2 locks held by syz-executor.4/22426: [ 1194.884848][ T27] 2 locks held by syz-executor.4/22430: [ 1194.890393][ T27] 2 locks held by syz-executor.4/22434: [ 1194.896560][ T27] 2 locks held by syz-executor.4/22442: [ 1194.902339][ T27] 1 lock held by syz-executor.1/22446: [ 1194.907800][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1194.918117][ T27] 2 locks held by syz-executor.4/22452: [ 1194.924060][ T27] 2 locks held by syz-executor.4/22455: [ 1194.929609][ T27] 2 locks held by syz-executor.4/22460: [ 1194.941345][ T27] 2 locks held by syz-executor.4/22465: [ 1194.954854][ T27] 3 locks held by syz-executor.4/22468: [ 1194.960401][ T27] 2 locks held by syz-executor.4/22471: [ 1194.969385][ T27] 2 locks held by syz-executor.4/22550: [ 1194.982047][ T27] 3 locks held by syz-executor.4/22554: [ 1194.987595][ T27] 2 locks held by syz-executor.4/22558: [ 1194.993537][ T27] 2 locks held by syz-executor.4/22562: [ 1194.999381][ T27] 3 locks held by syz-executor.4/22565: [ 1195.012071][ T27] 2 locks held by syz-executor.4/22569: [ 1195.017667][ T27] 2 locks held by syz-executor.4/22677: [ 1195.023845][ T27] 2 locks held by syz-executor.4/22680: [ 1195.029393][ T27] 3 locks held by syz-executor.4/22764: [ 1195.035277][ T27] 3 locks held by syz-executor.4/22772: [ 1195.040818][ T27] 3 locks held by syz-executor.4/22793: [ 1195.052048][ T27] [ 1195.054408][ T27] ============================================= [ 1195.054408][ T27] [ 1195.073317][ T27] NMI backtrace for cpu 0 [ 1195.077657][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0 [ 1195.085644][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1195.095703][ T27] Call Trace: [ 1195.098976][ T27] [ 1195.101905][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1195.106615][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1195.112246][ T27] ? panic+0x84d/0x84d [ 1195.116317][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1195.121527][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 1195.126466][ T27] ? __wake_up_klogd+0xd5/0x100 [ 1195.131339][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1195.137494][ T27] ? _printk+0xd1/0x111 [ 1195.141647][ T27] ? panic+0x84d/0x84d [ 1195.145729][ T27] ? __wake_up_klogd+0xcc/0x100 [ 1195.150585][ T27] ? panic+0x84d/0x84d [ 1195.154659][ T27] ? __rcu_read_unlock+0x92/0x100 [ 1195.159695][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1195.165822][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1195.171804][ T27] watchdog+0xe72/0xeb0 [ 1195.176024][ T27] kthread+0x3f6/0x4f0 [ 1195.180095][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1195.185129][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1195.189724][ T27] ret_from_fork+0x1f/0x30 [ 1195.194150][ T27] [ 1195.197744][ T27] Sending NMI from CPU 0 to CPUs 1: [ 1195.203199][ C1] NMI backtrace for cpu 1 [ 1195.203209][ C1] CPU: 1 PID: 2943 Comm: syslogd Not tainted 5.15.151-syzkaller #0 [ 1195.203226][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1195.203234][ C1] RIP: 0010:__rcu_read_unlock+0x65/0x100 [ 1195.203254][ C1] Code: b6 04 23 84 c0 75 69 41 89 6d 00 85 ed 75 1d 4d 8d be 40 04 00 00 4c 89 f8 48 c1 e8 03 42 0f b6 04 20 84 c0 75 78 41 83 3f 00 <75> 23 42 0f b6 04 23 84 c0 75 52 41 8b 45 00 3d 00 00 00 40 73 0b [ 1195.203266][ C1] RSP: 0018:ffffc9000d157a48 EFLAGS: 00000246 [ 1195.203280][ C1] RAX: 0000000000000000 RBX: 1ffff1100486dbaf RCX: ffff88802436d940 [ 1195.203292][ C1] RDX: 0000000000000000 RSI: ffffffff8ad88f20 RDI: ffffffff8ad88ee0 [ 1195.203303][ C1] RBP: 0000000000000000 R08: ffffffff83cb20b1 R09: fffffbfff1f79e19 [ 1195.203314][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 1195.203324][ C1] R13: ffff88802436dd7c R14: ffff88802436d940 R15: ffff88802436dd80 [ 1195.203336][ C1] FS: 00007f7a288e8380(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 1195.203350][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1195.203361][ C1] CR2: 00007f4ebab676e4 CR3: 0000000022e64000 CR4: 00000000003506e0 [ 1195.203375][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1195.203384][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1195.203394][ C1] Call Trace: [ 1195.203398][ C1] [ 1195.203403][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 1195.203421][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1195.203437][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1195.203453][ C1] ? unknown_nmi_error+0xd0/0xd0 [ 1195.203543][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1195.203557][ C1] ? nmi_handle+0xf7/0x370 [ 1195.203572][ C1] ? __rcu_read_unlock+0x65/0x100 [ 1195.203586][ C1] ? default_do_nmi+0x62/0x150 [ 1195.203601][ C1] ? exc_nmi+0xab/0x120 [ 1195.203614][ C1] ? end_repeat_nmi+0x16/0x31 [ 1195.203657][ C1] ? aa_file_perm+0x2e1/0xf60 [ 1195.203708][ C1] ? __rcu_read_unlock+0x65/0x100 [ 1195.203722][ C1] ? __rcu_read_unlock+0x65/0x100 [ 1195.203738][ C1] ? __rcu_read_unlock+0x65/0x100 [ 1195.203752][ C1] 21:26:09 executing program 4: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x80, 0x2, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb58, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x80e8, 0xbf, 0xad, 0x8, 0x2, 0x6, 0x1000, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = syz_clone(0x29200000, &(0x7f0000000180)="e1", 0x1, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="7d960839797dfa96822ec10794eaabfcd1a42aff57fbf9aab376791ef2aec14964ad57b25ff31c3b99f0a5a8067cfde50899ad97ea98e1bb4cb94fca55a1c749516b93ffe81fd1c20ad2a246c48f09b545022039f0d6d4524baea1f93025fce19813f65e4921432e69717c2d31612d6ed84a595ef60d65db81146ee066e469562a5ec22bf9afbbf7a7fa662c12ed893aa56cbd0bca925fac60539dbeb86b2d1c1d2b") perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0xf7, 0x84, 0x10, 0x0, 0x9, 0x5024, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x37}, 0x102904, 0x80000000, 0x5, 0x2, 0x4a8c, 0x9, 0xd7, 0x0, 0x12000000, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) syz_clone(0x48001800, &(0x7f0000000380)="12b72ac2f02c96292093c048fb4d5feca3e3da5e21e6a493b32aade8d38e893706da4f3643f49733637ae290e2bf8a761401882557374f340529d50c4939ba9b5dddbdd490dede215b34d41e7d26639265c4703adca1ea1c99225f0016ae28c33d20d7c1e68046132a2a9ec6dfd2d52e2daa1480d94b134ebcdd8b4c7b1eff52159d2e246e7f7763e6e3d418d8cee7b717a04067e077dc446854b9decbb8c78370c478720e9a647d513187610a7c1aee6f0e9dc98d4e78c93389b107b1a93a277a2af31385dc944feb84f357b326a4cea19e50612604c00559a2f938ced698f916b55c3f59e1ebd1c945017a066ba472cf534b3b3541fce4e77d202cad", 0xfd, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="702bdba77da92cfefc38bdfd0e619716a64909280478f3d3b03d80a52f0417bf32507f8cfa4713b045f52544c9a684689f51f9498ff6075df7d23b79ab") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000580), 0x2, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x1, 0x80, 0x6, 0x6, 0x81, 0x3, 0x0, 0x1, 0x10200, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x10000}, 0x4, 0x100, 0x420785e2, 0xce2a31efc5efdf5e, 0x1ff, 0x4, 0xff, 0x0, 0x7, 0x0, 0x8}, r3, 0xe, 0xffffffffffffffff, 0xb) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x80, 0x40, 0x1, 0x2, 0x13, 0x0, 0x80, 0x100, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0xffff, 0x101}, 0x200, 0xffffffff, 0x5, 0x5, 0xcf08, 0x1f, 0x9}, r3, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x948f2785345aaac7, 0x1, 0x80000000, 0x0, 0x1900, r2, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x4, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x0, 0x7f, [{0xb, 0x1, 0x14745dc1}]}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x80, 0x3}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x6, 0x9}]}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @struct={0x6, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x5, 0x5, 0x400}]}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @typedef={0x2}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000d00)=""/142, 0xb8, 0x8e, 0x0, 0xd8}, 0x20) perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x80, 0x3f, 0x6, 0xfa, 0x3, 0x0, 0x100000001, 0x50400, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x2, 0x8}, 0x400, 0x2, 0x101, 0x6, 0x2, 0xed, 0xff, 0x0, 0x1000, 0x0, 0x3}, r3, 0x4, r0, 0x1) [ 1195.203757][ C1] [ 1195.203763][ C1] aa_file_perm+0x3aa/0xf60 [ 1195.203777][ C1] ? reacquire_held_locks+0x660/0x660 [ 1195.203791][ C1] ? __lock_acquire+0x1ff0/0x1ff0 [ 1195.203806][ C1] ? aa_path_link+0xea0/0xea0 [ 1195.203819][ C1] ? sock_read_iter+0x36c/0x480 [ 1195.203858][ C1] ? memcpy+0x3c/0x60 [ 1195.203891][ C1] ? sock_read_iter+0x36c/0x480 [ 1195.203908][ C1] ? mark_lock+0x98/0x340 [ 1195.203922][ C1] common_file_perm+0x173/0x1d0 [ 1195.203938][ C1] security_file_permission+0x65/0xa0 [ 1195.203986][ C1] vfs_write+0x257/0xe50 [ 1195.204004][ C1] ? file_end_write+0x250/0x250 [ 1195.204020][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1195.204034][ C1] ? __context_tracking_exit+0x4c/0x80 [ 1195.204048][ C1] ? __lock_acquire+0x1ff0/0x1ff0 [ 1195.204063][ C1] ? __fdget_pos+0x2d2/0x380 [ 1195.204095][ C1] ksys_write+0x1a2/0x2c0 [ 1195.204109][ C1] ? print_irqtrace_events+0x210/0x210 [ 1195.204124][ C1] ? __ia32_sys_read+0x80/0x80 [ 1195.204139][ C1] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1195.204153][ C1] ? lockdep_hardirqs_on+0x94/0x130 [ 1195.204172][ C1] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1195.204188][ C1] do_syscall_64+0x3d/0xb0 [ 1195.204204][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1195.204219][ C1] RIP: 0033:0x7f7a28a3cbf2 [ 1195.204232][ C1] Code: 89 c7 48 89 44 24 08 e8 7b 34 fa ff 48 8b 44 24 08 48 83 c4 28 c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 20 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 6f 48 8b 15 07 a2 0d 00 f7 d8 64 89 02 48 83 [ 1195.204243][ C1] RSP: 002b:00007ffd709f10d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1195.204258][ C1] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f7a28a3cbf2 [ 1195.204269][ C1] RDX: 000000000000004f RSI: 00005641c19dfc50 RDI: 0000000000000003 [ 1195.204279][ C1] RBP: 00005641c19dfc50 R08: 0000000000000001 R09: 0000000000000000 [ 1195.204288][ C1] R10: 00007f7a28bdb3a3 R11: 0000000000000246 R12: 000000000000004f [ 1195.204298][ C1] R13: 00007f7a288e8300 R14: 0000000000000004 R15: 00005641c19dfa60 [ 1195.204315][ C1] [ 1195.228123][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 1195.627100][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0 [ 1195.635079][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1195.645132][ T27] Call Trace: [ 1195.648409][ T27] [ 1195.651340][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1195.656032][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1195.661671][ T27] ? panic+0x84d/0x84d [ 1195.665756][ T27] panic+0x318/0x84d [ 1195.669663][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 1195.675297][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1195.681457][ T27] ? fb_is_primary_device+0xcc/0xcc [ 1195.686670][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1195.692741][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1195.698892][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1195.705050][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1195.711210][ T27] watchdog+0xeb0/0xeb0 [ 1195.715378][ T27] kthread+0x3f6/0x4f0 [ 1195.719451][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1195.724476][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1195.729064][ T27] ret_from_fork+0x1f/0x30 [ 1195.733487][ T27] [ 1195.736557][ T27] Kernel Offset: disabled [ 1195.740876][ T27] Rebooting in 86400 seconds..